Topics
Sort by:
Attacker Value
Very High
CVE-2024-29824
Disclosure Date: May 31, 2024 (last updated October 04, 2024)
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
1
Attacker Value
Moderate
CVE-2024-45519
Disclosure Date: October 02, 2024 (last updated October 04, 2024)
The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.
1
Attacker Value
Unknown
CVE-2024-7010
Last updated October 02, 2024
**Timing Attack in mudler/localai**
**Description:**
The mudler/localai project is vulnerable to a Timing Attack. A Timing Attack is a type of side-channel attack where an attacker exploits variations in the time taken to execute cryptographic operations to gain sensitive information. In the case of password handling, this vulnerability could allow an attacker to infer valid login credentials by analyzing the server's response time during authentication attempts.
0
Attacker Value
Unknown
CVE-2024-7783
Last updated October 02, 2024
**Improper Storage of Sensitive Information in Bearer Token in mintplex-labs/anything-llm**
**Description:**
The mintplex-labs/anything-llm project has a vulnerability where a password is inappropriately stored within a JWT (JSON Web Token) used as a bearer token in single-user mode. When the token is decoded, the password is exposed in plaintext. This mishandling of sensitive information introduces serious security risks, as an attacker who gains access to the JWT can decode it and retrieve the password without difficulty.
0
Attacker Value
Moderate
CVE-2023-25950
Disclosure Date: April 11, 2023 (last updated October 08, 2023)
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
2
Attacker Value
Moderate
CVE-2024-47176
Disclosure Date: September 26, 2024 (last updated October 02, 2024)
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
3
Attacker Value
Very High
CVE-2024-45195
Disclosure Date: September 04, 2024 (last updated September 06, 2024)
Direct Request ('Forced Browsing') vulnerability in Apache OFBiz.
This issue affects Apache OFBiz: before 18.12.16.
Users are recommended to upgrade to version 18.12.16, which fixes the issue.
1
Attacker Value
Very High
CVE-2024-36401
Disclosure Date: July 01, 2024 (last updated July 04, 2024)
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.
The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatu…
2
Attacker Value
Very High
CVE-2020-14882 — Unauthenticated RCE in Console component of Oracle WebLogic Se…
Disclosure Date: October 21, 2020 (last updated December 28, 2020)
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
12
Attacker Value
Very High
CVE-2023-45249
Disclosure Date: July 24, 2024 (last updated July 27, 2024)
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
2