Show filters
329,464 Total Results
Displaying 2,641-2,650 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2024-6051

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Cross Application Scripting vulnerability in Vercom S.A. Redlink SDK in specific situations allows local code injection and to manipulate the view of a vulnerable application.This issue affects Redlink SDK versions through 1.13.
0
Attacker Value
Unknown

CVE-2024-47641

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloperr Confetti Fall Animation allows Stored XSS.This issue affects Confetti Fall Animation: from n/a through 1.3.0.
0
Attacker Value
Unknown

CVE-2024-45920

Disclosure Date: September 30, 2024 (last updated October 01, 2024)
A Stored Cross-Site Scripting (XSS) vulnerability in Solvait 24.4.2 allows remote attackers to inject malicious scripts into the application. This issue arises due to insufficient input validation and sanitization in "Intrest" feature.
0
Attacker Value
Unknown

CVE-2024-45772

Disclosure Date: September 30, 2024 (last updated October 05, 2024)
Deserialization of Untrusted Data vulnerability in Apache Lucene Replicator. This issue affects Apache Lucene's replicator module: from 4.4.0 before 9.12.0. The deprecated org.apache.lucene.replicator.http package is affected. The org.apache.lucene.replicator.nrt package is not affected. Users are recommended to upgrade to version 9.12.0, which fixes the issue. Java serialization filters (such as -Djdk.serialFilter='!*' on the commandline) can mitigate the issue on vulnerable versions without impacting functionality.
Attacker Value
Unknown

CVE-2024-9329

Disclosure Date: September 30, 2024 (last updated October 08, 2024)
In Eclipse Glassfish versions before 7.0.17, The Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is '/management/domain'. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
Attacker Value
Unknown

CVE-2024-8459

Disclosure Date: September 30, 2024 (last updated October 05, 2024)
Certain switch models from PLANET Technology store SNMPv3 users' passwords in plaintext within the configuration files, allowing remote attackers with administrator privileges to read the file and obtain the credentials.
Attacker Value
Unknown

CVE-2024-8458

Disclosure Date: September 30, 2024 (last updated October 05, 2024)
Certain switch models from PLANET Technology have a web application that is vulnerable to Cross-Site Request Forgery (CSRF). An unauthenticated remote attacker can trick a user into visiting a malicious website, allowing the attacker to impersonate the user and perform actions on their behalf, such as creating accounts.
Attacker Value
Unknown

CVE-2024-8457

Disclosure Date: September 30, 2024 (last updated October 05, 2024)
Certain switch models from PLANET Technology have a web application that does not properly validate specific parameters, allowing remote authenticated users with administrator privileges to inject arbitrary JavaScript, leading to Stored XSS attack.
Attacker Value
Unknown

CVE-2024-8456

Disclosure Date: September 30, 2024 (last updated October 05, 2024)
Certain switch models from PLANET Technology lack proper access control in firmware upload and download functionality, allowing unauthenticated remote attackers to download and upload firmware and system configurations, ultimately gaining full control of the devices.
Attacker Value
Unknown

CVE-2024-8455

Disclosure Date: September 30, 2024 (last updated October 05, 2024)
The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords.