Show filters
10,203 Total Results
Displaying 221-230 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown
CVE-2025-22744
Disclosure Date: January 15, 2025 (last updated January 16, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob von Bothmer / SeoDev S-DEV SEO allows Stored XSS.This issue affects S-DEV SEO: from n/a through 1.88.
0
Attacker Value
Unknown
CVE-2024-47140
Disclosure Date: January 15, 2025 (last updated January 16, 2025)
A cross-site scripting (xss) vulnerability exists in the add_alert_check page of Observium CE 24.4.13528. A specially crafted HTTP request can lead to a arbitrary javascript code execution. An authenticated user would need to click a malicious link provided by the attacker.
0
Attacker Value
Unknown
CVE-2024-47002
Disclosure Date: January 15, 2025 (last updated January 16, 2025)
A html code injection vulnerability exists in the vlan management part of Observium CE 24.4.13528. A specially crafted HTTP request can lead to an arbitrary html code. An authenticated user would need to click a malicious link provided by the attacker.
0
Attacker Value
Unknown
CVE-2024-45061
Disclosure Date: January 15, 2025 (last updated January 16, 2025)
A cross-site scripting (xss) vulnerability exists in the weather map editor functionality of Observium CE 24.4.13528. A specially crafted HTTP request can lead to a arbitrary javascript code execution. An authenticated user would need to click a malicious link provided by the attacker.
0
Attacker Value
Unknown
CVE-2024-54142
Disclosure Date: January 14, 2025 (last updated January 15, 2025)
Discourse AI is a Discourse plugin which provides a number of AI features. When sharing Discourse AI Bot conversations into posts, if the conversation had HTML entities those could leak into the Discourse application when a user visited a post with a onebox to said conversation. This issue has been addressed in commit `92f122c`. Users are advised to update. Users unable to update may remove all groups from `ai bot public sharing allowed groups` site setting.
0
Attacker Value
Unknown
CVE-2025-23052
Disclosure Date: January 14, 2025 (last updated January 15, 2025)
Authenticated command injection vulnerability in the command line interface of a network management service. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands as a privileged user on the underlying operating system.
0
Attacker Value
Unknown
CVE-2025-23051
Disclosure Date: January 14, 2025 (last updated January 15, 2025)
An authenticated parameter injection vulnerability exists in the web-based management interface of the AOS-8 and AOS-10 Operating Systems. Successful exploitation could allow an authenticated user to leverage parameter injection to overwrite arbitrary system files.
0
Attacker Value
Unknown
CVE-2025-0070
Disclosure Date: January 14, 2025 (last updated January 14, 2025)
SAP NetWeaver Application Server for ABAP and ABAP Platform allows an authenticated attacker to obtain illegitimate access to the system by exploiting improper authentication checks, resulting in privilege escalation. On successful exploitation, this can result in potential security concerns. This results in a high impact on confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2025-0069
Disclosure Date: January 14, 2025 (last updated January 14, 2025)
Due to DLL injection vulnerability in SAPSetup, an attacker with either local user privileges or with access to a compromised corporate user�s Windows account could gain higher privileges. With this, he could move laterally within the network and further compromise the active directory of a company. This leads to high impact on confidentiality, integrity and availability of the Windows server.
0
Attacker Value
Unknown
CVE-2025-0068
Disclosure Date: January 14, 2025 (last updated January 14, 2025)
An obsolete functionality in SAP NetWeaver Application Server ABAP did not perform necessary authorization checks. Because of this, an authenticated attacker could obtain information that would otherwise be restricted. It has no impact on integrity or availability on the application.
0