Show filters
77 Total Results
Displaying 1-10 of 77
Sort by:
Attacker Value
Unknown

CVE-2024-52558

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The affected product is vulnerable to an integer underflow. An unauthenticated attacker could send a malformed HTTP request, which could allow the attacker to crash the program.
0
Attacker Value
Unknown

CVE-2024-52320

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The affected product is vulnerable to a command injection. An unauthenticated attacker could send commands through a malicious HTTP request which could result in remote code execution.
0
Attacker Value
Unknown

CVE-2024-48871

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check input size before copying data to the stack, potentially allowing remote code execution.
0
Attacker Value
Unknown

CVE-2024-43201

Disclosure Date: September 23, 2024 (last updated October 01, 2024)
The Planet Fitness Workouts iOS and Android mobile apps prior to version 9.8.12 (released on 2024-07-25) fail to properly validate TLS certificates, allowing an attacker with appropriate network access to obtain session tokens and sensitive information.
Attacker Value
Unknown

CVE-2015-10129

Disclosure Date: February 04, 2024 (last updated February 13, 2024)
A vulnerability was found in planet-freo up to 20150116 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/inc/auth.inc.php. The manipulation of the argument auth leads to incorrect comparison. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is 6ad38c58a45642eb8c7844e2f272ef199f59550d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-252716.
Attacker Value
Unknown

CVE-2023-6532

Disclosure Date: January 08, 2024 (last updated January 12, 2024)
The WP Blogs' Planetarium WordPress plugin through 1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Attacker Value
Unknown

CVE-2023-32303

Disclosure Date: May 12, 2023 (last updated October 08, 2023)
Planet is software that provides satellite data. The secret file stores the user's Planet API authentication information. It should only be accessible by the user, but before version 2.0.1, its permissions allowed the user's group and non-group to read the file as well. This issue was patched in version 2.0.1. As a workaround, set the secret file permissions to only user read/write by hand.
Attacker Value
Unknown

CVE-2014-125080

Disclosure Date: January 16, 2023 (last updated October 20, 2023)
A vulnerability has been found in frontaccounting faplanet and classified as critical. This vulnerability affects unknown code. The manipulation leads to path traversal. The patch is identified as a5dcd87f46080a624b1a9ad4b0dd035bbd24ac50. It is recommended to apply a patch to fix this issue. VDB-218398 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2022-45896

Disclosure Date: December 25, 2022 (last updated October 08, 2023)
Planet eStream before 6.72.10.07 allows unauthenticated upload of arbitrary files: Choose a Video / Related Media or Upload Document. Upload2.ashx can be used, or Ajax.asmx/ProcessUpload2. This leads to remote code execution.
Attacker Value
Unknown

CVE-2022-45895

Disclosure Date: December 25, 2022 (last updated October 08, 2023)
Planet eStream before 6.72.10.07 discloses sensitive information, related to the ON cookie (findable in HTML source code for Default.aspx in some situations) and the WhoAmI endpoint (e.g., path disclosure).