Show filters
297 Total Results
Displaying 21-30 of 297
Sort by:
Attacker Value
Unknown

CVE-2024-45422

Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access.
0
Attacker Value
Unknown

CVE-2024-45420

Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access.
0
Attacker Value
Unknown

CVE-2024-45419

Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access.
0
Attacker Value
Unknown

CVE-2024-52345

Disclosure Date: November 18, 2024 (last updated November 19, 2024)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Roberto Alicata ra_qrcode allows Stored XSS.This issue affects ra_qrcode: from n/a through 2.1.0.
0
Attacker Value
Unknown

CVE-2024-50531

Disclosure Date: November 04, 2024 (last updated November 07, 2024)
Unrestricted Upload of File with Dangerous Type vulnerability in David F. Carr RSVPMaker for Toastmasters allows Upload a Web Shell to a Web Server.This issue affects RSVPMaker for Toastmasters: from n/a through 6.2.4.
Attacker Value
Unknown

CVE-2024-47560

Disclosure Date: October 01, 2024 (last updated October 01, 2024)
RevoWorks Cloud Client 3.0.91 and earlier contains an incorrect authorization vulnerability. If this vulnerability is exploited, unintended processes may be executed in the sandbox environment. Even if malware is executed in the sandbox environment, it does not compromise the client's local environment. However, information in the sandbox environment may be disclosed to outside or behaviors of the sandbox environment may be violated by tampering registry.
0
Attacker Value
Unknown

CVE-2024-38380

Disclosure Date: September 17, 2024 (last updated October 03, 2024)
This vulnerability occurs when user-supplied input is improperly sanitized and then reflected back to the user's browser, allowing an attacker to execute arbitrary JavaScript in the context of the victim's browser session.
Attacker Value
Unknown

CVE-2024-7784

Disclosure Date: September 10, 2024 (last updated September 10, 2024)
During internal Axis Security Development Model (ASDM) threat-modelling, a flaw was found in the protection for device tampering (commonly known as Secure Boot) in AXIS OS making it vulnerable to a sophisticated attack to bypass this protection. To Axis' knowledge, there are no known exploits of the vulnerability at this time. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
0
Attacker Value
Unknown

CVE-2024-6979

Disclosure Date: September 10, 2024 (last updated September 10, 2024)
Amin Aliakbari, member of the AXIS OS Bug Bounty Program, has found a broken access control which would lead to less-privileged operator- and/or viewer accounts having more privileges than designed. The risk of exploitation is very low as it requires complex steps to execute, including knowing of account passwords and social engineering attacks in tricking the administrator to perform specific configurations on operator- and/or viewer-privileged accounts. Axis has released patched AXIS OS a version for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
0
Attacker Value
Unknown

CVE-2024-6509

Disclosure Date: September 10, 2024 (last updated September 10, 2024)
Marinus Pfund, member of the AXIS OS Bug Bounty Program, has found the VAPIX API alwaysmulti.cgi was vulnerable for file globbing which could lead to resource exhaustion of the Axis device. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
0