Show filters
325,661 Total Results
Displaying 951-960 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2024-46610

Disclosure Date: September 25, 2024 (last updated October 01, 2024)
An access control issue in IceCMS v3.4.7 and before allows attackers to arbitrarily modify users' information, including username and password, via a crafted POST request sent to the endpoint /User/ChangeUser/s in the ChangeUser function in UserController.java
Attacker Value
Unknown

CVE-2024-46609

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
An access control issue in the CheckVip function in UserController.java of IceCMS v3.4.7 and before allows unauthenticated attackers to access and returns all user information, including passwords
0
Attacker Value
Unknown

CVE-2024-46607

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
Incorrect access control in IceCMS v3.4.7 and before allows attackers to authenticate by entering any arbitrary values as the username and password via the loginAdmin method in the UserController.java file.
0
Attacker Value
Unknown

CVE-2024-45599

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
Cursor is an artificial intelligence code editor. Prior to version 0.41.0, if a user on macOS has granted Cursor access to the camera or microphone, any program that is run on the machine is able to access the camera or the microphone without explicitly being granted access, through a DyLib Injection using DYLD_INSERT_LIBRARIES environment variable. The usage of `com.apple.security.cs.allow-dyld-environment-variables` and `com.apple.security.cs.disable-library-validation` allows an external dynamic library to be injected into the application using DYLD_INSERT_LIBRARIES environment variable. Moreover, the entitlement `com.apple.security.device.camera` allows the application to use the host camera and `com.apple.security.device.audio-input` allows the application to use the microphone. This means that untrusted code that is executed on the user's machine can access the camera or the microphone, if the user has already given permission for Cursor to do so. In version 0.41.0, the entitle…
0
Attacker Value
Unknown

CVE-2024-45373

Disclosure Date: September 25, 2024 (last updated October 02, 2024)
Once logged in to ProGauge MAGLINK LX4 CONSOLE, a valid user can change their privileges to administrator.
Attacker Value
Unknown

CVE-2024-45066

Disclosure Date: September 25, 2024 (last updated October 02, 2024)
A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE IP sub-menu can allow a remote attacker to inject arbitrary commands.
Attacker Value
Unknown

CVE-2024-43693

Disclosure Date: September 25, 2024 (last updated October 02, 2024)
A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE UTILITY sub-menu can allow a remote attacker to inject arbitrary commands.
Attacker Value
Unknown

CVE-2024-43692

Disclosure Date: September 25, 2024 (last updated October 02, 2024)
An attacker can directly request the ProGauge MAGLINK LX CONSOLE resource sub page with full privileges by requesting the URL directly.
Attacker Value
Unknown

CVE-2024-43423

Disclosure Date: September 25, 2024 (last updated October 02, 2024)
The web application for ProGauge MAGLINK LX4 CONSOLE contains an administrative-level user account with a password that cannot be changed.
Attacker Value
Unknown

CVE-2024-42797

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
An Incorrect Access Control vulnerability was found in /music/ajax.php?action=delete_playlist in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to delete the valid music playlist entries.
0