Show filters
1,463 Total Results
Displaying 221-230 of 1,463
Sort by:
Attacker Value
Unknown
CVE-2024-22128
Disclosure Date: February 13, 2024 (last updated February 26, 2025)
SAP NWBC for HTML - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An unauthenticated attacker can inject malicious javascript to cause limited impact to confidentiality and integrity of the application data after successful exploitation.
0
Attacker Value
Unknown
CVE-2024-22318
Disclosure Date: February 09, 2024 (last updated February 26, 2025)
IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
0
Attacker Value
Unknown
CVE-2024-23764
Disclosure Date: February 08, 2024 (last updated February 26, 2025)
Certain WithSecure products allow Local Privilege Escalation. This affects WithSecure Client Security 15 and later, WithSecure Server Security 15 and later, WithSecure Email and Server Security 15 and later, and WithSecure Elements Endpoint Protection 17 and later.
0
Attacker Value
Unknown
CVE-2023-28063
Disclosure Date: February 06, 2024 (last updated February 26, 2025)
Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
0
Attacker Value
Unknown
CVE-2024-23841
Disclosure Date: January 30, 2024 (last updated February 26, 2025)
apollo-client-nextjs is the Apollo Client support for the Next.js App Router. The @apollo/experimental-apollo-client-nextjs NPM package is vulnerable to a cross-site scripting vulnerability. To exploit this vulnerability, an attacker would need to either inject malicious input (e.g. by redirecting a user to a specifically-crafted link) or arrange to have malicious input be returned by a GraphQL server (e.g. by persisting it in a database). To fix this issue, please update to version 0.7.0 or later.
0
Attacker Value
Unknown
CVE-2023-6340
Disclosure Date: January 18, 2024 (last updated February 26, 2025)
SonicWall Capture Client version 3.7.10, NetExtender client version 10.2.337 and earlier versions are installed with sfpmonitor.sys driver. The driver has been found to be vulnerable to Denial-of-Service (DoS) caused by Stack-based Buffer Overflow vulnerability.
0
Attacker Value
Unknown
CVE-2024-0056
Disclosure Date: January 09, 2024 (last updated February 25, 2025)
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
0
Attacker Value
Unknown
CVE-2023-6338
Disclosure Date: January 03, 2024 (last updated February 25, 2025)
Uncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.
0
Attacker Value
Unknown
CVE-2024-21623
Disclosure Date: January 02, 2024 (last updated February 25, 2025)
OTCLient is an alternative tibia client for otserv. Prior to commit db560de0b56476c87a2f967466407939196dd254, the /mehah/otclient "`Analysis - SonarCloud`" workflow is vulnerable to an expression injection in Actions, allowing an attacker to run commands remotely on the runner, leak secrets, and alter the repository using this workflow. Commit db560de0b56476c87a2f967466407939196dd254 contains a fix for this issue.
0
Attacker Value
Unknown
CVE-2023-7143
Disclosure Date: December 29, 2023 (last updated February 25, 2025)
A vulnerability was found in code-projects Client Details System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/regester.php. The manipulation of the argument fname/lname/email/contact leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249146 is the identifier assigned to this vulnerability.
0