Show filters
63 Total Results
Displaying 1-10 of 63
Sort by:
Attacker Value
Very High

CVE-2022-38812

Disclosure Date: August 31, 2022 (last updated February 24, 2025)
AeroCMS 0.1.1 is vulnerable to SQL Injection via the author parameter.
Attacker Value
Moderate

CVE-2020-16152

Disclosure Date: November 14, 2021 (last updated February 23, 2025)
The NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file.
Attacker Value
Unknown

CVE-2025-1077

Disclosure Date: February 07, 2025 (last updated February 07, 2025)
A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather). The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled. A remote unauthenticated attacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS pipeline with specially crafted Form Properties, enabling remote execution of arbitrary Python code. This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services are run under a privileged user account—contrary to the documented installation best practices. Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).
0
Attacker Value
Unknown

CVE-2024-51561

Disclosure Date: November 04, 2024 (last updated November 07, 2024)
This vulnerability exists in Aero due to improper implementation of OTP validation mechanism in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by intercepting and manipulating the responses exchanged during the second factor authentication process. Successful exploitation of this vulnerability could allow the attacker to bypass OTP verification for accessing other user accounts.
Attacker Value
Unknown

CVE-2024-51560

Disclosure Date: November 04, 2024 (last updated November 09, 2024)
This vulnerability exists in the Wave 2.0 due to improper exception handling for invalid inputs at certain API endpoint. An authenticated remote attacker could exploit this vulnerability by providing invalid inputs for “userId” parameter in the API request leading to generation of error message containing sensitive information on the targeted system.
Attacker Value
Unknown

CVE-2024-51559

Disclosure Date: November 04, 2024 (last updated November 22, 2024)
This vulnerability exists in the Wave 2.0 due to improper authorization checks on certain API endpoints. An authenticated remote attacker could exploit this vulnerability by manipulating API input parameters to gain unauthorized access and perform malicious activities on other user accounts.
Attacker Value
Unknown

CVE-2024-51558

Disclosure Date: November 04, 2024 (last updated November 09, 2024)
This vulnerability exists in the Wave 2.0 due to missing restrictions for excessive failed authentication attempts on its API based login. A remote attacker could exploit this vulnerability by conducting a brute force attack against legitimate user OTP, MPIN or password, which could lead to gain unauthorized access and compromise other user accounts.
Attacker Value
Unknown

CVE-2024-51557

Disclosure Date: November 04, 2024 (last updated November 09, 2024)
This vulnerability exists in the Wave 2.0 due to missing rate limiting on OTP requests in an API endpoint. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoint which could lead to the OTP bombing/flooding on the targeted system.
Attacker Value
Unknown

CVE-2024-51556

Disclosure Date: November 04, 2024 (last updated November 22, 2024)
This vulnerability exists in the Wave 2.0 due to insufficient encryption of sensitive data received at the API response. An authenticated remote attacker could exploit this vulnerability by manipulating API input parameters through API request URL/payload leading to unauthorized access to sensitive information belonging to other users.
Attacker Value
Unknown

CVE-2024-30275

Disclosure Date: May 16, 2024 (last updated December 21, 2024)
Adobe Aero Desktop versions 23.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.