Show filters
953 Total Results
Displaying 51-60 of 953
Sort by:
Attacker Value
Unknown
CVE-2024-36588
Disclosure Date: June 13, 2024 (last updated February 26, 2025)
An issue in Annonshop.app DecentralizeJustice/ anonymousLocker commit 2b2b4 allows attackers to send messages erroneously attributed to arbitrary users via a crafted HTTP request.
0
Attacker Value
Unknown
CVE-2024-38284
Disclosure Date: June 13, 2024 (last updated February 26, 2025)
Transmitted data is logged between the device and the backend service. An attacker could use these logs to perform a replay attack to replicate calls.
0
Attacker Value
Unknown
CVE-2024-34065
Disclosure Date: June 12, 2024 (last updated February 26, 2025)
Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch.
0
Attacker Value
Unknown
CVE-2024-5211
Disclosure Date: June 12, 2024 (last updated February 26, 2025)
A path traversal vulnerability in mintplex-labs/anything-llm allowed a manager to bypass the `normalizePath()` function, intended to defend against path traversal attacks. This vulnerability enables the manager to read, delete, or overwrite the 'anythingllm.db' database file and other files stored in the 'storage' directory, such as internal communication keys and .env secrets. Exploitation of this vulnerability could lead to application compromise, denial of service (DoS) attacks, and unauthorized admin account takeover. The issue stems from improper validation of user-supplied input in the process of setting a custom logo for the app, which can be manipulated to achieve arbitrary file read, deletion, or overwrite, and to execute a DoS attack by deleting critical files required for the application's operation.
0
Attacker Value
Unknown
CVE-2024-5812
Disclosure Date: June 11, 2024 (last updated February 26, 2025)
A low severity vulnerability in BIPS has been identified where an attacker with high privileges or a compromised high privilege account can overwrite Read-Only smart rules via a specially crafted API request.
0
Attacker Value
Unknown
CVE-2024-28021
Disclosure Date: June 11, 2024 (last updated February 26, 2025)
A vulnerability exists in the FOXMAN-UN/UNEM server that affects the message
queueing mechanism’s certificate validation. If exploited an attacker could spoof a trusted entity causing a loss of confidentiality
and integrity.
0
Attacker Value
Unknown
CVE-2024-2462
Disclosure Date: June 11, 2024 (last updated February 26, 2025)
Allow attackers to intercept or falsify data exchanges between the client
and the server
0
Attacker Value
Unknown
CVE-2024-35749
Disclosure Date: June 10, 2024 (last updated February 26, 2025)
Authentication Bypass by Spoofing vulnerability in Acurax Under Construction / Maintenance Mode from Acurax allows Authentication Bypass.This issue affects Under Construction / Maintenance Mode from Acurax: from n/a through 2.6.
0
Attacker Value
Unknown
CVE-2024-4320
Disclosure Date: June 06, 2024 (last updated February 26, 2025)
A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the `@router.post("/install_extension")` route handler. The vulnerability arises due to improper handling of the `name` parameter in the `ExtensionBuilder().build_extension()` method, which allows for local file inclusion (LFI) leading to arbitrary code execution. An attacker can exploit this vulnerability by crafting a malicious `name` parameter that causes the server to load and execute a `__init__.py` file from an arbitrary location, such as the upload directory for discussions. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to remote code execution without requiring user interaction, especially when the application is exposed to an external endpoint or operated in headless mode.
0
Attacker Value
Unknown
CVE-2024-3429
Disclosure Date: June 06, 2024 (last updated February 26, 2025)
A path traversal vulnerability exists in the parisneo/lollms application, specifically within the `sanitize_path_from_endpoint` and `sanitize_path` functions in `lollms_core\lollms\security.py`. This vulnerability allows for arbitrary file reading when the application is running on Windows. The issue arises due to insufficient sanitization of user-supplied input, enabling attackers to bypass the path traversal protection mechanisms by crafting malicious input. Successful exploitation could lead to unauthorized access to sensitive files, information disclosure, and potentially a denial of service (DoS) condition by including numerous large or resource-intensive files. This vulnerability affects the latest version prior to 9.6.
0