U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
There are 233,448 matching records.
Displaying matches 21 through 40.
Vuln ID Summary CVSS Severity
CVE-2024-24313

An issue in Vaales Technologies V_QRS v.2024-01-17 allows a remote attacker to obtain sensitive information via the Models/FormModel.php and QRModel.php component.

Published: May 01, 2024; 3:15:22 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-24312

SQL injection vulnerability in Vaales Technologies V_QRS v.2024-01-17 allows a remote attacker to obtain sensitive information via the Models/UserModel.php component.

Published: May 01, 2024; 3:15:22 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-22830

Anti-Cheat Expert's Windows kernel module "ACE-BASE.sys" version 1.0.2202.6217 does not perform proper access control when handling system resources. This allows a local attacker to escalate privileges from regular user to System or PPL level.

Published: May 01, 2024; 3:15:22 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2023-26793

libmodbus v3.1.10 has a heap-based buffer overflow vulnerability in read_io_status function in src/modbus.c.

Published: May 01, 2024; 3:15:21 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2023-23022

Cross site scripting (XSS) vulnerability in sourcecodester oretnom23 employee's payroll management system 1.0, allows attackers to execute arbitrary code via the code, title, from_date and to_date inputs in file Main.php.

Published: May 01, 2024; 3:15:21 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2023-23021

Cross Site Scripting (XSS) vulnerability in sourcecodester oretnom23 pos point sale system 1.0, allows attackers to execute arbitrary code via the code, name, and description inputs in file Main.php.

Published: May 01, 2024; 3:15:21 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2023-23019

Cross site scripting (XSS) vulnerability in file main.php in sourcecodester oretnom23 Blog Site 1.0 via the name and email parameters to function user_add.\

Published: May 01, 2024; 3:15:20 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-33442

An issue in flusity-CMS v.2.33 allows a remote attacker to execute arbitrary code via the add_post.php component.

Published: May 01, 2024; 2:15:24 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-33078

Tencent Libpag v4.3 is vulnerable to Buffer Overflow. A user can send a crafted image to trigger a overflow leading to remote code execution.

Published: May 01, 2024; 2:15:24 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-32213

The LoMag WareHouse Management application version 1.0.20.120 and older were found to allow weak passwords. By default, hard-coded passwords of 10 characters with little or no complexity are allowed.

Published: May 01, 2024; 2:15:24 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-32212

SQL Injection vulnerability in LOGINT LoMag Inventory Management v1.0.20.120 and before allows an attacker to execute arbitrary code via the ArticleGetGroups, DocAddDocument, ClassClickShop and frmSettings components.

Published: May 01, 2024; 2:15:24 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-32211

An issue in LOGINT LoMag Inventory Management v1.0.20.120 and before allows a local attacker to obtain sensitive information via the UserClass.cs and Settings.cs components.

Published: May 01, 2024; 2:15:23 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-32210

The LoMag WareHouse Management application version 1.0.20.120 and older were to utilize hard-coded passwords by default for forms and SQL connections.

Published: May 01, 2024; 2:15:23 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-30176

In Logpoint before 7.4.0, an attacker can enumerate a valid list of usernames by using publicly exposed URLs of shared widgets.

Published: May 01, 2024; 2:15:19 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-29010

The XML document processed in the GMS ECM URL endpoint is vulnerable to XML external entity (XXE) injection, potentially resulting in the disclosure of sensitive information. This issue affects GMS: 9.3.4 and earlier versions.

Published: May 01, 2024; 2:15:17 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-33518

An unauthenticated Denial-of-Service (DoS) vulnerability exists in the Radio Frequency Manager service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected service.

Published: May 01, 2024; 1:15:37 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-33517

An unauthenticated Denial-of-Service (DoS) vulnerability exists in the Radio Frequency Manager service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected service.

Published: May 01, 2024; 1:15:37 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-33516

An unauthenticated Denial of Service (DoS) vulnerability exists in the Auth service accessed via the PAPI protocol provided by ArubaOS. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the controller.

Published: May 01, 2024; 1:15:37 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-33515

Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.

Published: May 01, 2024; 1:15:36 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-33514

Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.

Published: May 01, 2024; 1:15:36 PM -0400
V3.x:(not available)
V2.0:(not available)