Show filters
985 Total Results
Displaying 51-60 of 985
Sort by:
Attacker Value
Unknown

CVE-2024-45274

Disclosure Date: October 15, 2024 (last updated October 18, 2024)
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
Attacker Value
Unknown

CVE-2024-45273

Disclosure Date: October 15, 2024 (last updated October 18, 2024)
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
Attacker Value
Unknown

CVE-2024-45271

Disclosure Date: October 15, 2024 (last updated October 22, 2024)
An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
Attacker Value
Unknown

CVE-2024-9282

Disclosure Date: September 27, 2024 (last updated October 05, 2024)
A vulnerability was found in bg5sbk MiniCMS 1.11. It has been classified as problematic. Affected is an unknown function of the file page-edit.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions confusing version and file name information. The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2024-9281

Disclosure Date: September 27, 2024 (last updated October 05, 2024)
A vulnerability was found in bg5sbk MiniCMS up to 1.11 and classified as problematic. This issue affects some unknown processing of the file post-edit.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions confusing version and file name information. The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2024-8485

Disclosure Date: September 25, 2024 (last updated October 03, 2024)
The REST API TO MiniProgram plugin for WordPress is vulnerable to privilege escalation via account takeovr in all versions up to, and including, 4.7.1 via the updateUserInfo() due to missing validation on the 'openid' user controlled key that determines what user will be updated. This makes it possible for unauthenticated attackers to update arbitrary user's accounts, including their email to a @weixin.com email, which can the be leveraged to reset the password of the user's account, including administrators.
Attacker Value
Unknown

CVE-2024-8484

Disclosure Date: September 25, 2024 (last updated October 03, 2024)
The REST API TO MiniProgram plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the /wp-json/watch-life-net/v1/comment/getcomments REST API endpoint in all versions up to, and including, 4.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Attacker Value
Unknown

CVE-2024-45104

Disclosure Date: September 13, 2024 (last updated September 19, 2024)
A valid, authenticated LXCA user without sufficient privileges may be able to use the device identifier to modify an LXCA managed device through a specially crafted web API call.
Attacker Value
Unknown

CVE-2024-45103

Disclosure Date: September 13, 2024 (last updated September 19, 2024)
A valid, authenticated LXCA user may be able to unmanage an LXCA managed device in through the LXCA web interface without sufficient privileges.
Attacker Value
Unknown

CVE-2024-45101

Disclosure Date: September 13, 2024 (last updated January 05, 2025)
A privilege escalation vulnerability was discovered when Single Sign On (SSO) is enabled that could allow an attacker to intercept a valid, authenticated LXCA user’s XCC session if they can convince the user to click on a specially crafted URL.
0