Search Results (Refine Search)
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-3367 |
Argument injection in websphere_mq agent plugin in Checkmk 2.0.0, 2.1.0, <2.2.0p25 and <2.3.0b5 allows local attacker to inject one argument to runmqsc Published: April 16, 2024; 8:15:10 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3867 |
The archive-tainacan-collection theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in version 2.7.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Published: April 16, 2024; 6:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-1357 |
The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's aux_timeline shortcode in all versions up to, and including, 2.15.5 due to insufficient input sanitization and output escaping on user supplied attributes such as thumb_mode and date_type. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Published: April 16, 2024; 6:15:07 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3872 |
Mattermost Mobile app versions 2.13.0 and earlier use a regular expression with polynomial complexity to parse certain deeplinks, which allows an unauthenticated remote attacker to freeze or crash the app via a long maliciously crafted link. Published: April 16, 2024; 5:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3871 |
The Delta Electronics DVW-W02W2-E2 devices expose a web administration interface to users. This interface implements two features (access control lists management, WPS pin setup) that are affected by command injections and stack overflows vulnerabilities. Successful exploitation of these flaws would allow remote authenticated attackers to gain remote command execution with elevated privileges on the affected devices. This issue affects DVW-W02W2-E2 through version 2.5.2. Published: April 16, 2024; 5:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-32634 |
In huge memory get unmapped area check, code can never be reached because of a logical contradiction. Published: April 16, 2024; 5:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-32633 |
An unsigned value can never be negative, so eMMC full disk test will always evaluate the same way. Published: April 16, 2024; 5:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-32632 |
A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly out-of-bounds memory access Published: April 16, 2024; 5:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-32631 |
Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations. Published: April 16, 2024; 5:15:07 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-32625 |
In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value left over from earlier computations Published: April 16, 2024; 5:15:07 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-32557 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Exclusive Addons Exclusive Addons Elementor allows Stored XSS.This issue affects Exclusive Addons Elementor: from n/a through 2.6.9.2. Published: April 16, 2024; 3:15:12 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-22262 |
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input. Published: April 16, 2024; 2:15:46 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-31784 |
An issue in Typora v.1.8.10 and before, allows a local attacker to obtain sensitive information and execute arbitrary code via a crafted payload to the src component. Published: April 16, 2024; 12:15:09 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-31783 |
Cross Site Scripting (XSS) vulnerability in Typora v.1.6.7 and before, allows a local attacker to obtain sensitive information via a crafted script during markdown file creation. Published: April 16, 2024; 12:15:09 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-31634 |
Cross Site Scripting (XSS) vulnerability in Xunruicms versions 4.6.3 and before, allows remote attacker to execute arbitrary code via the Security.php file in the catalog \XunRuiCMS\dayrui\Fcms\Library. Published: April 16, 2024; 12:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3575 |
Cross-site Scripting (XSS) - Stored in mindsdb/mindsdb Published: April 15, 2024; 8:15:12 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3574 |
In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove the Authorization header when redirecting across domains. The exposure of the Authorization header to unauthorized actors could potentially allow for account hijacking. Published: April 15, 2024; 8:15:12 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3573 |
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root. Published: April 15, 2024; 8:15:12 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3572 |
The scrapy/scrapy project is vulnerable to XML External Entity (XXE) attacks due to the use of lxml.etree.fromstring for parsing untrusted XML data without proper validation. This vulnerability allows attackers to perform denial of service attacks, access local files, generate network connections, or circumvent firewalls by submitting specially crafted XML data. Published: April 15, 2024; 8:15:12 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3571 |
langchain-ai/langchain is vulnerable to path traversal due to improper limitation of a pathname to a restricted directory ('Path Traversal') in its LocalFileStore functionality. An attacker can leverage this vulnerability to read or write files anywhere on the filesystem, potentially leading to information disclosure or remote code execution. The issue lies in the handling of file paths in the mset and mget methods, where user-supplied input is not adequately sanitized, allowing directory traversal sequences to reach unintended directories. Published: April 15, 2024; 8:15:12 PM -0400 |
V3.x:(not available) V2.0:(not available) |