Search Results (Refine Search)
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-31372 |
Cross-Site Request Forgery (CSRF) vulnerability in Arnan de Gans No-Bot Registration.This issue affects No-Bot Registration: from n/a through 1.9.1. Published: April 12, 2024; 6:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-31371 |
Cross-Site Request Forgery (CSRF) vulnerability in Xylus Themes WP Event Aggregator.This issue affects WP Event Aggregator: from n/a through 1.7.6. Published: April 12, 2024; 6:15:07 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3400 |
A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. Published: April 12, 2024; 4:15:06 AM -0400 |
V3.1: 10.0 CRITICAL V2.0:(not available) |
CVE-2024-29400 |
An issue was discovered in RuoYi v4.5.1, allows attackers to obtain sensitive information via the status parameter. Published: April 12, 2024; 3:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-27309 |
While an Apache Kafka cluster is being migrated from ZooKeeper mode to KRaft mode, in some cases ACLs will not be correctly enforced. Two preconditions are needed to trigger the bug: 1. The administrator decides to remove an ACL 2. The resource associated with the removed ACL continues to have two or more other ACLs associated with it after the removal. When those two preconditions are met, Kafka will treat the resource as if it had only one ACL associated with it after the removal, rather than the two or more that would be correct. The incorrect condition is cleared by removing all brokers in ZK mode, or by adding a new ACL to the affected resource. Once the migration is completed, there is no metadata loss (the ACLs all remain). The full impact depends on the ACLs in use. If only ALLOW ACLs were configured during the migration, the impact would be limited to availability impact. if DENY ACLs were configured, the impact could include confidentiality and integrity impact depending on the ACLs configured, as the DENY ACLs might be ignored due to this vulnerability during the migration period. Published: April 12, 2024; 3:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-22526 |
Buffer Overflow vulnerability in bandisoft bandiview v7.0, allows local attackers to cause a denial of service (DoS) via exr image file. Published: April 12, 2024; 3:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-30850 |
An issue in tiagorlampert CHAOS v5.0.1 allows a remote attacker to execute arbitrary code via the BuildClient function within client_service.go Published: April 12, 2024; 2:15:06 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-30614 |
An issue in Ametys CMS v4.5.0 and before allows attackers to obtain sensitive information via exposed resources to the error scope. Published: April 12, 2024; 2:15:06 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-22734 |
An issue was discovered in AMCS Group Trux Waste Management Software before version 7.19.0018.26912, allows local attackers to obtain sensitive information via a static, hard-coded AES Key-IV pair in the TxUtilities.dll and TruxUser.cfg components. Published: April 12, 2024; 2:15:06 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-49528 |
Buffer Overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via the af_dialoguenhance.c:261:5 in the de_stereo component. Published: April 12, 2024; 2:15:06 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-44856 |
Cross Site Scripting (XSS) vulnerability in Cobham SAILOR VSAT Ku v.164B019, allows a remote attacker to execute arbitrary code via a crafted script to the rstat, sender, and recipients' parameters of the sub_21D24 function in the acu_web file. Published: April 12, 2024; 1:15:46 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-44855 |
Cross Site Scripting (XSS) vulnerability in Cobham SAILOR VSAT Ku v.164B019 allows a remote attacker to execute arbitrary code via a crafted script to the rdiag, sender, and recipients parameters of the sub_219C4 function in the acu_web file. Published: April 12, 2024; 1:15:46 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-44857 |
An issue in Cobham SAILOR VSAT Ku v.164B019, allows a remote attacker to execute arbitrary code via a crafted script to the sub_21D24 function in the acu_web component. Published: April 12, 2024; 12:15:09 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-44854 |
Cross Site Scripting (XSS) vulnerability in Cobham SAILOR VSAT Ku v.164B019, allows a remote attacker to execute arbitrary code via a crafted script to the c_set_rslog_decode function in the acu_web file. Published: April 12, 2024; 12:15:09 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-44853 |
\An issue was discovered in Cobham SAILOR VSAT Ku v.164B019, allows a remote attacker to execute arbitrary code via a crafted script to the sub_219C4 function in the acu_web file. Published: April 12, 2024; 12:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-44852 |
Cross Site Scripting (XSS) vulnerability in Cobham SAILOR VSAT Ku v.164B019, allows a remote attacker to execute arbitrary code via a crafted script to the c_set_traps_decode function in the acu_web file. Published: April 12, 2024; 12:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-2801 |
The Shopkeeper Extender plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'image_slide' shortcode in all versions up to, and including, 3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Published: April 11, 2024; 11:15:07 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-2137 |
The All-in-One Addons for Elementor – WidgetKit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple pricing widgets (e.g. Pricing Single, Pricing Icon, Pricing Tab) in all versions up to, and including, 2.4.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Published: April 11, 2024; 11:15:07 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-22357 |
IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 280894. Published: April 11, 2024; 11:15:06 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-50307 |
IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 273338. Published: April 11, 2024; 11:15:06 PM -0400 |
V3.x:(not available) V2.0:(not available) |