Show filters
329,389 Total Results
Displaying 2,541-2,550 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2024-28809

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
An issue was discovered in Infinera hiT 7300 5.60.50. Cleartext storage of sensitive password in firmware update packages allows attackers to access various appliance services via hardcoded credentials.
0
Attacker Value
Unknown

CVE-2024-9158

Disclosure Date: September 30, 2024 (last updated October 08, 2024)
A stored cross site scripting vulnerability exists in Nessus Network Monitor where an authenticated, privileged local attacker could inject arbitrary code into the NNM UI via the local CLI.
Attacker Value
Unknown

CVE-2024-47536

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. A user with the editmyprivateinfo right or who can otherwise change their name can XSS themselves by setting their "real name" to an XSS payload. This vulnerability is fixed in 2.31.0.
0
Attacker Value
Unknown

CVE-2024-46549

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
An issue in the TP-Link MQTT Broker and API gateway of TP-Link Kasa KP125M v1.0.3 allows attackers to establish connections by impersonating devices owned by other users.
0
Attacker Value
Unknown

CVE-2024-46548

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
TP-Link Tapo P125M and Kasa KP125M v1.0.3 was discovered to improperly validate certificates, allowing attackers to eavesdrop on communications and access sensitive information via a man-in-the-middle attack.
0
Attacker Value
Unknown

CVE-2024-46540

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
A remote code execution (RCE) vulnerability in the component /admin/store.php of Emlog Pro before v2.3.15 allows attackers to use remote file downloads and self-extract fucntions to upload webshells to the target server, thereby obtaining system privileges.
0
Attacker Value
Unknown

CVE-2024-45993

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Giflib Project v5.2.2 is vulnerable to a heap buffer overflow via gif2rgb.
0
Attacker Value
Unknown

CVE-2024-47532

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
0
Attacker Value
Unknown

CVE-2024-47531

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Scout is a web-based visualizer for VCF-files. Due to the lack of sanitization in the filename, it is possible bypass intended file extension and make users download malicious files with any extension. With malicious content injected inside the file data and users unknowingly downloading it and opening may lead to the compromise of users' devices or data. This vulnerability is fixed in 4.89.
0
Attacker Value
Unknown

CVE-2024-47530

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89.
0