Show filters
97 Total Results
Displaying 1-10 of 97
Sort by:
Attacker Value
Unknown

CVE-2024-55888

Disclosure Date: December 12, 2024 (last updated December 18, 2024)
Hush Line is an open-source whistleblower management system. Starting in version 0.1.0 and prior to version 0.3.5, the productions server appeared to have been misconfigured and missed providing any content security policy or security headers. This could result in bypassing of cross-site scripting filters. Version 0.3.5 fixed the issue.
0
Attacker Value
Unknown

CVE-2024-51992

Disclosure Date: November 11, 2024 (last updated November 12, 2024)
Orchid is a @laravel package that allows for rapid application development of back-office applications, admin/user panels, and dashboards. This vulnerability is a method exposure issue (CWE-749: Exposed Dangerous Method or Function) in the Orchid Platform’s asynchronous modal functionality, affecting users of Orchid Platform version 8 through 14.42.x. Attackers could exploit this vulnerability to call arbitrary methods within the `Screen` class, leading to potential brute force of database tables, validation checks against user credentials, and disclosure of the server’s real IP address. The issue has been patched in the latest release, version 14.43.0, released on November 6, 2024. Users should upgrade to version 14.43.0 or later to address this vulnerability. If upgrading to version 14.43.0 is not immediately possible, users can mitigate the vulnerability by implementing middleware to intercept and validate requests to asynchronous modal endpoints, allowing only approved methods and…
0
Attacker Value
Unknown

CVE-2024-51591

Disclosure Date: November 09, 2024 (last updated November 15, 2024)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wpgrids Slicko allows DOM-Based XSS.This issue affects Slicko: from n/a through 1.2.0.
Attacker Value
Unknown

CVE-2024-47221

Disclosure Date: September 22, 2024 (last updated September 29, 2024)
CheckUser in ScadaServerEngine/MainLogic.cs in Rapid SCADA through 5.8.4 allows an empty password.
Attacker Value
Unknown

CVE-2024-38523

Disclosure Date: June 27, 2024 (last updated June 28, 2024)
Hush Line is a free and open-source, anonymous-tip-line-as-a-service for organizations or individuals. The TOTP authentication flow has multiple issues that weakens its one-time nature. Specifically, the lack of 2FA for changing security settings allows attacker with CSRF or XSS primitives to change such settings without user interaction and credentials are required. This vulnerability has been patched in version 0.10.
0
Attacker Value
Unknown

CVE-2024-22096

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system.
Attacker Value
Unknown

CVE-2024-22016

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an authorized user can write directly to the Scada directory. This may allow privilege escalation.
Attacker Value
Unknown

CVE-2024-21869

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them.
Attacker Value
Unknown

CVE-2024-21866

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product responds back with an error message containing sensitive data if it receives a specific malformed request.
Attacker Value
Unknown

CVE-2024-21794

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can redirect users to malicious pages through the login page.