Show filters
976 Total Results
Displaying 81-90 of 976
Sort by:
Attacker Value
Unknown
CVE-2024-0451
Disclosure Date: May 22, 2024 (last updated January 05, 2025)
The AI ChatBot plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the openai_file_list_callback function in all versions up to, and including, 5.3.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to list files existing in a linked OpenAI account.
0
Attacker Value
Unknown
CVE-2024-34905
Disclosure Date: May 16, 2024 (last updated February 26, 2025)
FlyFish v3.0.0 was discovered to contain a buffer overflow via the password parameter on the login page. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
0
Attacker Value
Unknown
CVE-2024-34352
Disclosure Date: May 14, 2024 (last updated February 26, 2025)
1Panel is an open source Linux server operation and maintenance management panel. Prior to v1.10.3-lts, there are many command injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. The mirror configuration write symbol `>` can be used to achieve arbitrary file writing. This vulnerability is fixed in v1.10.3-lts.
0
Attacker Value
Unknown
CVE-2024-34380
Disclosure Date: May 06, 2024 (last updated February 26, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuantumCloud Conversational Forms for ChatBot allows Stored XSS.This issue affects Conversational Forms for ChatBot: from n/a through 1.2.0.
0
Attacker Value
Unknown
CVE-2024-32696
Disclosure Date: April 22, 2024 (last updated February 26, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuantumCloud Infographic Maker – iList allows Stored XSS.This issue affects Infographic Maker – iList: from n/a through 4.6.6.
0
Attacker Value
Unknown
CVE-2024-30257
Disclosure Date: April 18, 2024 (last updated February 26, 2025)
1Panel is an open source Linux server operation and maintenance management panel. The password verification in the source code uses the != symbol instead hmac.Equal. This may lead to a timing attack vulnerability. This vulnerability is fixed in 1.10.3-lts.
0
Attacker Value
Unknown
CVE-2024-31342
Disclosure Date: April 10, 2024 (last updated February 26, 2025)
Missing Authorization vulnerability in WPcloudgallery WordPress Gallery Exporter.This issue affects WordPress Gallery Exporter: from n/a through 1.3.
0
Attacker Value
Unknown
CVE-2024-30249
Disclosure Date: April 04, 2024 (last updated February 26, 2025)
Cloudburst Network provides network components used within Cloudburst projects. A vulnerability in versions prior to `1.0.0.CR1-20240330.101522-15` impacts publicly accessible software depending on the affected versions of Network and allows an attacker to use Network as an amplification vector for a UDP denial of service attack against a third party or as an attempt to trigger service suspension of the host. All consumers of the library should upgrade to at least version `1.0.0.CR1-20240330.101522-15` to receive a fix. There are no known workarounds beyond updating the library.
0
Attacker Value
Unknown
CVE-2024-30247
Disclosure Date: March 29, 2024 (last updated February 26, 2025)
NextcloudPi is a ready to use image for Virtual Machines, Raspberry Pi, Odroid HC1, Rock64 and other boards. A command injection vulnerability in NextCloudPi allows command execution as the root user via the NextCloudPi web-panel. Due to a security misconfiguration this can be used by anyone with access to NextCloudPi web-panel, no authentication is required. It is recommended that the NextCloudPi is upgraded to 1.53.1.
0
Attacker Value
Unknown
CVE-2024-29202
Disclosure Date: March 29, 2024 (last updated February 26, 2025)
JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.
0