Show filters
8,319 Total Results
Displaying 361-370 of 8,319
Sort by:
Attacker Value
Unknown
CVE-2024-49768
Disclosure Date: October 29, 2024 (last updated February 26, 2025)
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may send a request that is exactly recv_bytes (defaults to 8192) long, followed by a secondary request using HTTP pipelining. When request lookahead is disabled (default) we won't read any more requests, and when the first request fails due to a parsing error, we simply close the connection. However when request lookahead is enabled, it is possible to process and receive the first request, start sending the error message back to the client while we read the next request and queue it. This will allow the secondary request to be serviced by the worker thread while the connection should be closed. Waitress 3.0.1 fixes the race condition. As a workaround, disable channel_request_lookahead, this is set to 0 by default disabling this feature.
0
Attacker Value
Unknown
CVE-2024-49662
Disclosure Date: October 29, 2024 (last updated February 26, 2025)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Webgensis Simple Load More allows Reflected XSS.This issue affects Simple Load More: from n/a through 1.0.
0
Attacker Value
Unknown
CVE-2024-50493
Disclosure Date: October 29, 2024 (last updated February 26, 2025)
Unrestricted Upload of File with Dangerous Type vulnerability in masterhomepage Automatic Translation allows Upload a Web Shell to a Web Server.This issue affects Automatic Translation: from n/a through 1.0.4.
0
Attacker Value
Unknown
CVE-2024-23843
Disclosure Date: October 28, 2024 (last updated February 26, 2025)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Genians Genian NAC V5.0, Genians Genian NAC LTS V5.0.This issue affects Genian NAC V5.0: from V5.0.0 through V5.0.60; Genian NAC LTS V5.0: from 5.0.0 LTS through 5.0.55 LTS(Revision 125558), from 5.0.0 LTS through 5.0.56 LTS(Revision 125560).
0
Attacker Value
Unknown
CVE-2020-26311
Disclosure Date: October 26, 2024 (last updated February 26, 2025)
Useragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no patches are available.
0
Attacker Value
Unknown
CVE-2022-30361
Disclosure Date: October 25, 2024 (last updated February 26, 2025)
OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.
0
Attacker Value
Unknown
CVE-2022-30360
Disclosure Date: October 25, 2024 (last updated February 26, 2025)
OvalEdge 5.2.8.0 and earlier is affected by multiple Stored XSS (AKA Persistent or Type II) vulnerabilities via a POST request to /profile/updateProfile via the slackid or phone parameters. Authentication is required.
0
Attacker Value
Unknown
CVE-2022-30359
Disclosure Date: October 25, 2024 (last updated February 26, 2025)
OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserList. Authentication is required. The information disclosed is associated with the all registered users, including user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.
0
Attacker Value
Unknown
CVE-2022-30358
Disclosure Date: October 25, 2024 (last updated February 26, 2025)
OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /user/updatePassword via the userId and newPsw parameters. Authentication is required.
0
Attacker Value
Unknown
CVE-2022-30357
Disclosure Date: October 25, 2024 (last updated February 26, 2025)
OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required.
0