Show filters
329,398 Total Results
Displaying 2,551-2,560 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2024-47178

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
basic-auth-connect is Connect's Basic Auth middleware in its own module. basic-auth-connect < 1.1.0 uses a timing-unsafe equality comparison that can leak timing information. This issue has been fixed in basic-auth-connect 1.1.0.
0
Attacker Value
Unknown

CVE-2024-47067

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.
0
Attacker Value
Unknown

CVE-2024-46869

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel_pcie: Allocate memory for driver private data Fix driver not allocating memory for struct btintel_data which is used to store internal data.
0
Attacker Value
Unknown

CVE-2024-46510

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
ESAFENET CDG v5 was discovered to contain a SQL injection vulnerability via the id parameter in the NavigationAjax interface
0
Attacker Value
Unknown

CVE-2024-46475

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
A reflected cross-site scripting (XSS) vulnerability on the homepage of Metronic Admin Dashboard Template v2.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload.
0
Attacker Value
Unknown

CVE-2024-47172

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with a CVAT account may retrieve certain information about any project, task, job or membership resource on the CVAT instance. The information exposed in this way is the same as the information returned on a GET request to the resource. In addition, the attacker can also alter the default source and target storage associated with any project or task. Upgrade to CVAT 2.19.1 or any later version to fix the issue.
0
Attacker Value
Unknown

CVE-2024-47064

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. If an attacker can trick a logged-in CVAT user into visiting a maliciously-constructed URL, they can initiate any API calls on that user's behalf. This gives the attacker temporary access to all data that the victim user has access to. Upgrade to CVAT 2.19.0 or a later version to fix this issue.
0
Attacker Value
Unknown

CVE-2024-47063

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. If a malicious CVAT user with permissions to either create a task, or edit an existing task can trick another logged-in user into visiting a maliciously-constructed URL, they can initiate any API calls on that user's behalf. This gives the attacker temporary access to all data that the victim user has access to. Upgrade to CVAT 2.19.0 or a later version to fix this issue.
0
Attacker Value
Unknown

CVE-2024-46313

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
TP-Link WR941ND V6 has a stack overflow vulnerability in the ssid parameter in /userRpm/popupSiteSurveyRpm.htm.
0
Attacker Value
Unknown

CVE-2024-46293

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Incorrect Access Control. There is a lack of authorization checks for admin operations. Specifically, an attacker can perform admin-level actions without possessing a valid session token. The application does not verify whether the user is logged in as an admin or even check for a session token at all.
0