Show filters
1,382 Total Results
Displaying 151-160 of 1,382
Sort by:
Attacker Value
Unknown

CVE-2024-34786

Disclosure Date: July 09, 2024 (last updated July 09, 2024)
UniFi iOS app 10.15.0 introduces a misconfiguration on 2nd Generation UniFi Access Points configured as standalone (not using UniFi Network Application) that could cause the SSID name to change and/or the WiFi Password to be removed on the 5GHz Radio. This vulnerability is fixed in UniFi iOS app 10.15.2 and later.
0
Attacker Value
Unknown

CVE-2024-6229

Disclosure Date: July 07, 2024 (last updated July 12, 2024)
A stored cross-site scripting (XSS) vulnerability exists in the 'Upload Knowledge' feature of stangirard/quivr, affecting the latest version. Users can upload files via URL, which allows the insertion of malicious JavaScript payloads. These payloads are stored on the server and executed whenever any user clicks on a link containing the payload, leading to potential data theft, session hijacking, and reputation damage.
Attacker Value
Unknown

CVE-2024-38998

Disclosure Date: July 01, 2024 (last updated January 29, 2025)
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
0
Attacker Value
Unknown

CVE-2024-5885

Disclosure Date: June 27, 2024 (last updated August 21, 2024)
stangirard/quivr version 0.0.236 contains a Server-Side Request Forgery (SSRF) vulnerability. The application does not provide sufficient controls when crawling a website, allowing an attacker to access applications on the local network. This vulnerability could allow a malicious user to gain access to internal servers, the AWS metadata endpoint, and capture Supabase data.
Attacker Value
Unknown

CVE-2024-37894

Disclosure Date: June 25, 2024 (last updated June 26, 2024)
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack.
0
Attacker Value
Unknown

CVE-2024-6303

Disclosure Date: June 25, 2024 (last updated September 21, 2024)
Missing authorization in Client-Server API in Conduit <=0.7.0, allowing for any alias to be removed and added to another room, which can be used for privilege escalation by moving the #admins alias to a room which they control, allowing them to run commands resetting passwords, siging json with the server's key, deactivating users, and more
Attacker Value
Unknown

CVE-2024-6302

Disclosure Date: June 25, 2024 (last updated September 21, 2024)
Lack of privilege checking when processing a redaction in Conduit versions v0.6.0 and lower, allowing a local user to redact any message from users on the same server, given that they are able to send redaction events.
Attacker Value
Unknown

CVE-2024-6301

Disclosure Date: June 25, 2024 (last updated September 21, 2024)
Lack of validation of origin in federation API in Conduit, allowing any remote server to impersonate any user from any server in most EDUs
Attacker Value
Unknown

CVE-2024-6300

Disclosure Date: June 25, 2024 (last updated September 21, 2024)
Incomplete cleanup when performing redactions in Conduit, allowing an attacker to check whether certain strings were present in the PDU before redaction
Attacker Value
Unknown

CVE-2024-6299

Disclosure Date: June 25, 2024 (last updated September 21, 2024)
Lack of consideration of key expiry when validating signatures in Conduit, allowing an attacker which has compromised an expired key to forge requests as the remote server, as well as PDUs with timestamps past the expiry date