CVE
stringlengths 13
16
| Description
stringlengths 20
3.95k
| KeyPhrases
stringlengths 2
343
|
---|---|---|
CVE-2024-20318
|
A vulnerability in the Layer 2 Ethernet services of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the line card network processor to reset, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of specific Ethernet frames that are received on line cards that have the Layer 2 services feature enabled. An attacker could exploit this vulnerability by sending specific Ethernet frames through an affected device. A successful exploit could allow the attacker to cause the ingress interface network processor to reset, resulting in a loss of traffic over the interfaces that are supported by the network processor. Multiple resets of the network processor would cause the line card to reset, resulting in a DoS condition.
|
['denial of service (DoS)', 'cause the line card network processor to reset', 'cause the ingress interface network processor to reset', 'layer ethernet services', 'denial of service (dos) condition', 'loss of traffic']
|
CVE-2024-20319
|
A vulnerability in the UDP forwarding code of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to bypass configured management plane protection policies and access the Simple Network Management Plane (SNMP) server of an affected device. This vulnerability is due to incorrect UDP forwarding programming when using SNMP with management plane protection. An attacker could exploit this vulnerability by attempting to perform an SNMP operation using broadcast as the destination address that could be processed by an affected device that is configured with an SNMP server. A successful exploit could allow the attacker to communicate to the device on the configured SNMP ports. Although an unauthenticated attacker could send UDP datagrams to the configured SNMP port, only an authenticated user can retrieve or modify data using SNMP requests.
|
['bypass configured management plane protection', 'bypass configured management plane protection policies and access', 'communicate to the device on the configured SNMP', 'udp forwarding code']
|
CVE-2024-20320
|
A vulnerability in the SSH client feature of Cisco IOS XR Software for Cisco 8000 Series Routers and Cisco Network Convergence System (NCS) 540 Series and 5700 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient validation of arguments that are included with the SSH client CLI command. An attacker with low-privileged access to an affected device could exploit this vulnerability by issuing a crafted SSH client command to the CLI. A successful exploit could allow the attacker to elevate privileges to root on the affected device.
|
['elevate privileges on an affected device', 'elevate privileges to root on the affected device']
|
CVE-2024-20321
|
A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the attacker to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network.
|
['denial of service (DoS)', 'cause a denial of service (DoS)', 'cause eBGP neighbor sessions to be dropped', 'certain characteristics']
|
CVE-2024-20322
|
A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
|
['bypass a configured ACL', 'access resources behind the affected device that were']
|
CVE-2024-20324
|
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords.This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access.
|
['access WLAN configuration details including passwords', 'access configuration details that they are not authorized', 'successful exploit']
|
CVE-2024-20325
|
A vulnerability in the Live Data server of Cisco Unified Intelligence Center could allow an unauthenticated, local attacker to read and modify data in a repository that belongs to an internal service on an affected device. This vulnerability is due to insufficient access control implementations on cluster configuration CLI requests. An attacker could exploit this vulnerability by sending a cluster configuration CLI request to specific directories on an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.
|
['read and modify data in a repository that', 'read and modify data that is handled by', 'live data server', 'successful exploit', 'insufficient access control']
|
CVE-2024-20327
|
A vulnerability in the PPP over Ethernet (PPPoE) termination feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, adjacent attacker to crash the ppp_ma process, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of malformed PPPoE packets that are received on a router that is running Broadband Network Gateway (BNG) functionality with PPPoE termination on a Lightspeed-based or Lightspeed-Plus-based line card. An attacker could exploit this vulnerability by sending a crafted PPPoE packet to an affected line card interface that does not terminate PPPoE. A successful exploit could allow the attacker to crash the ppp_ma process, resulting in a DoS condition for PPPoE traffic across the router.
|
['denial of service (DoS)', 'crash the ppp_ma process', 'denial of service (dos) condition']
|
CVE-2024-20328
|
A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.ClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
['inject arbitrary commands', 'inject arbitrary commands with the privileges of the', 'command-line sequences', 'execute arbitrary']
|
CVE-2024-20332
|
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device. To successfully exploit this vulnerability, the attacker would need valid Super Admin credentials.
|
['send arbitrary network requests', 'conduct a server-side request forgery (', 'send arbitrary network requests that are sourced from', 'server-side request forgery (ssrf)', 'server side request forgery', 'improper input validation']
|
CVE-2024-20333
|
A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device. This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field.
|
['change specific data within the interface on an', 'change a specific field within the web-']
|
CVE-2024-20334
|
A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
|
['execute arbitrary script code', 'conduct a cross-site scripting (XSS', 'execute arbitrary script code in the context of', 'cross-site scripting (xss)', 'insufficient input validation']
|
CVE-2024-20335
|
A vulnerability in the web-based management interface of Cisco Small Business 100, 300, and 500 Series Wireless APs could allow an authenticated, remote attacker to perform command injection attacks against an affected device. In order to exploit this vulnerability, the attacker must have valid administrative credentials for the device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.
|
['execute arbitrary code', 'perform command injection attacks against an affected device', 'execute arbitrary code as the root user on', 'web-based management interface']
|
CVE-2024-20336
|
A vulnerability in the web-based user interface of Cisco Small Business 100, 300, and 500 Series Wireless APs could allow an authenticated, remote attacker to perform buffer overflow attacks against an affected device. In order to exploit this vulnerability, the attacker must have valid administrative credentials for the device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.
|
['execute arbitrary code', 'perform buffer overflow attacks against an affected device', 'execute arbitrary code as the root user on']
|
CVE-2024-20337
|
A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
|
['execute arbitrary script code', 'conduct a carriage return line feed (CRLF', 'execute arbitrary script code in the browser or', 'saml authentication process', 'carriage return line feed (crlf) injection']
|
CVE-2024-20338
|
A vulnerability in the ISE Posture (System Scan) module of Cisco Secure Client for Linux could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to the use of an uncontrolled search path element. An attacker could exploit this vulnerability by copying a malicious library file to a specific directory in the filesystem and persuading an administrator to restart a specific process. A successful exploit could allow the attacker to execute arbitrary code on an affected device with root privileges.
|
['execute arbitrary code', 'elevate privileges on an affected device', 'execute arbitrary code on an affected device with', 'uncontrolled search path element', 'root privilege']
|
CVE-2024-20344
|
A vulnerability in system resource management in Cisco UCS 6400 and 6500 Series Fabric Interconnects that are in Intersight Managed Mode (IMM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the Device Console UI of an affected device. This vulnerability is due to insufficient rate-limiting of TCP connections to an affected device. An attacker could exploit this vulnerability by sending a high number of TCP packets to the Device Console UI. A successful exploit could allow an attacker to cause the Device Console UI process to crash, resulting in a DoS condition. A manual reload of the fabric interconnect is needed to restore complete functionality.
|
['denial of service (DoS)', 'cause a denial of service (DoS)', 'cause the Device Console UI process to crash', 'system resource management']
|
CVE-2024-20345
|
A vulnerability in the file upload functionality of Cisco AppDynamics Controller could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to access sensitive data on an affected device.
|
['conduct directory traversal attacks on an affected device', 'access sensitive data on an affected device', 'file upload functionality']
|
CVE-2024-20346
|
A vulnerability in the web-based management interface of Cisco AppDynamics Controller could allow an authenticated, remote attacker to perform a reflected cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
|
['execute arbitrary script code', 'perform a reflected cross-site scripting (', 'execute arbitrary script code in the context of', 'reflected cross-site scripting (xss)']
|
CVE-2024-20347
|
A vulnerability in Cisco Emergency Responder could allow an unauthenticated, remote attacker to conduct a CSRF attack, which could allow the attacker to perform arbitrary actions on an affected device. This vulnerability is due to insufficient protections for the web UI of an affected system. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user, such as deleting users from the device.
|
['perform arbitrary actions', 'conduct a CSRF attack', 'perform arbitrary actions on an affected device', 'perform arbitrary actions with the privilege level of', 'csrf', 'deleting users']
|
CVE-2024-20348
|
A vulnerability in the Out-of-Band (OOB) Plug and Play (PnP) feature of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to read arbitrary files. This vulnerability is due to an unauthenticated provisioning web server. An attacker could exploit this vulnerability through direct web requests to the provisioning server. A successful exploit could allow the attacker to read sensitive files in the PnP container that could facilitate further attacks on the PnP infrastructure.
|
['read arbitrary files', 'read sensitive files in the PnP container that', 'out-of-band (oob) plug and play (pnp) feature', 'direct web requests']
|
CVE-2024-20352
|
A vulnerability in Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a directory traversal attack, which could allow the attacker to perform arbitrary actions on an affected device. This vulnerability is due to insufficient protections for the web UI of an affected system. An attacker could exploit this vulnerability by sending crafted requests to the web UI. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user, such as accessing password or log files or uploading and deleting existing files from the system.
|
['perform arbitrary actions', 'conduct a directory traversal attack', 'perform arbitrary actions on an affected device', 'perform arbitrary actions with the privilege level of']
|
CVE-2024-20354
|
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.
|
['denial of service (DoS)', 'cause a denial of service (DoS)', 'cause degradation of service to other clients']
|
CVE-2024-20362
|
A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
|
['execute arbitrary script code', 'conduct a cross-site scripting (XSS', 'execute arbitrary script code in the context of', 'cross-site scripting (xss)', 'malicious payloads', 'insufficient input validation']
|
CVE-2024-20367
|
A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
|
['execute arbitrary script code', 'conduct a cross-site scripting (XSS', 'execute arbitrary script code in the context of', 'cross-site scripting (xss)']
|
CVE-2024-20368
|
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.
|
['perform arbitrary actions', 'conduct a cross-site request forgery (', 'perform arbitrary actions on the affected device with', 'cross-site request forgery (csrf)', 'cross site request forgery']
|
CVE-2024-2042
|
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Accordion widget in all versions up to, and including, 3.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-2044
|
pgAdmin <= 8.3 is affected by a path-traversal vulnerability while deserializing users sessions in the session handling code. If the server is running on Windows, an unauthenticated attacker can load and deserialize remote pickle objects and gain code execution. If the server is running on POSIX/Linux, an authenticated attacker can upload pickle objects, deserialize them, and gain code execution.
|
['gain code execution', 'path-traversal', 'path traversal']
|
CVE-2024-2045
|
Session version 1.17.5 allows obtaining internal application files and publicfiles from the user's device without the user's consent. This is possiblebecause the application is vulnerable to Local File Read via chat attachments.
|
['Local File Read via chat attachments', 'local file read']
|
CVE-2024-2047
|
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.0.6 via the render_raw function. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other safe file types can be uploaded and included.
|
['execute arbitrary files', 'bypass access controls', 'obtain sensitive data', 'local file inclusion', 'code execution']
|
CVE-2024-2048
|
Vault and Vault Enterprise (Vault) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious certificate that could be used to bypass authentication. Fixed in Vault 1.15.5 and 1.14.10.
|
['bypass authentication', 'malicious certificate']
|
CVE-2024-2049
|
Server-Side Request Forgery (SSRF) in Citrix SD-WAN Standard/Premium Editions on or after 11.4.0 and before 11.4.4.46 allows an attacker to disclose limited information from the appliance via Access to management IP.
|
['disclose limited information from the appliance via Access', 'server-side request forgery (ssrf)']
|
CVE-2024-2050
|
CWE-79: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)vulnerability exists when an attacker injects then executes arbitrary malicious JavaScript codewithin the context of the product.
|
['cwe-79', 'cross-site scripting', 'execute arbitrary']
|
CVE-2024-2051
|
CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists thatcould cause account takeover and unauthorized access to the system when an attackerconducts brute-force attacks against the login form.
|
['cwe-307', 'account takeover', 'unauthorized access', 'brute-force']
|
CVE-2024-2052
|
CWE-552: Files or Directories Accessible to External Parties vulnerability exists that could allowunauthenticated files and logs exfiltration and download of files when an attacker modifies theURL to download to a different location.
|
['cwe-552', 'exfiltration']
|
CVE-2024-2053
|
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of theThe Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
|
['deserialize arbitrary PHP objects', 'code execution', 'local file inclusion', 'arbitrary file requests']
|
CVE-2024-2054
|
The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
|
['deserialize arbitrary PHP objects', 'code execution']
|
CVE-2024-2055
|
The "Rich Filemanager" feature of Artica Proxy provides a web-based interface for file management capabilities. When the feature is enabled, it does not require authentication by default, and runs as the root user.
|
[]
|
CVE-2024-2056
|
Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.
|
[]
|
CVE-2024-2057
|
A vulnerability was found in LangChain langchain_community 0.0.26. It has been classified as critical. Affected is the function load_local in the library libs/community/langchain_community/retrievers/tfidf.py of the component TFIDFRetriever. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.27 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-255372.
|
['server side request forgery']
|
CVE-2024-2058
|
A vulnerability was found in SourceCodester Petrol Pump Management Software 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/app/product.php. The manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255373 was assigned to this vulnerability.
|
['unrestricted upload']
|
CVE-2024-2059
|
A vulnerability was found in SourceCodester Petrol Pump Management Software 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/app/service_crud.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-255374 is the identifier assigned to this vulnerability.
|
['unrestricted upload']
|
CVE-2024-2060
|
A vulnerability classified as critical has been found in SourceCodester Petrol Pump Management Software 1.0. This affects an unknown part of the file /admin/app/login_crud.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255375.
|
['sql injection']
|
CVE-2024-2061
|
A vulnerability classified as critical was found in SourceCodester Petrol Pump Management Software 1.0. This vulnerability affects unknown code of the file /admin/edit_supplier.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255376.
|
['sql injection']
|
CVE-2024-2062
|
A vulnerability, which was classified as critical, has been found in SourceCodester Petrol Pump Management Software 1.0. This issue affects some unknown processing of the file /admin/edit_categories.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255377 was assigned to this vulnerability.
|
['sql injection']
|
CVE-2024-2063
|
A vulnerability, which was classified as problematic, was found in SourceCodester Petrol Pump Management Software 1.0. Affected is an unknown function of the file /admin/app/profile_crud.php. The manipulation of the argument username leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-255378 is the identifier assigned to this vulnerability.
|
['cross site scripting', 'cross-site scripting']
|
CVE-2024-2064
|
A vulnerability has been found in rahman SelectCours 1.0 and classified as problematic. Affected by this vulnerability is the function getCacheNames of the file CacheController.java of the component Template Handler. The manipulation of the argument fragment leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255379.
|
[]
|
CVE-2024-2065
|
A vulnerability was found in SourceCodester Barangay Population Monitoring System up to 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /endpoint/update-resident.php. The manipulation of the argument full_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255380.
|
['cross site scripting']
|
CVE-2024-20652
|
Windows HTML Platforms Security Feature Bypass Vulnerability
|
['Security Feature Bypass', 'security feature bypass']
|
CVE-2024-20653
|
Microsoft Common Log File System Elevation of Privilege Vulnerability
|
['microsoft common log file system elevation of privilege']
|
CVE-2024-20654
|
Microsoft ODBC Driver Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-20655
|
Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-20656
|
Visual Studio Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-20657
|
Windows Group Policy Elevation of Privilege Vulnerability
|
['windows group policy elevation of privilege']
|
CVE-2024-20658
|
Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
|
['microsoft virtual hard disk elevation of privilege']
|
CVE-2024-2066
|
A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been classified as problematic. This affects an unknown part of the file /endpoint/add-computer.php. The manipulation of the argument model leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255381 was assigned to this vulnerability.
|
['cross site scripting', 'cross-site scripting']
|
CVE-2024-20660
|
Microsoft Message Queuing Information Disclosure Vulnerability
|
['message queuing information disclosure']
|
CVE-2024-20661
|
Microsoft Message Queuing Denial of Service Vulnerability
|
['microsoft message queuing denial of service']
|
CVE-2024-20662
|
Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability
|
['information disclosure']
|
CVE-2024-20663
|
Windows Message Queuing Client (MSMQC) Information Disclosure
|
['information disclosure']
|
CVE-2024-20664
|
Microsoft Message Queuing Information Disclosure Vulnerability
|
['message queuing information disclosure']
|
CVE-2024-20666
|
BitLocker Security Feature Bypass Vulnerability
|
['Security Feature Bypass', 'bitlocker security feature bypass']
|
CVE-2024-20667
|
Azure DevOps Server Remote Code Execution Vulnerability
|
['azure devops server remote code execution']
|
CVE-2024-2067
|
A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/delete-computer.php. The manipulation of the argument computer leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255382 is the identifier assigned to this vulnerability.
|
['sql injection']
|
CVE-2024-20671
|
Microsoft Defender Security Feature Bypass Vulnerability
|
['Security Feature Bypass', 'security feature bypass']
|
CVE-2024-20672
|
.NET Denial of Service Vulnerability
|
['denial of service']
|
CVE-2024-20673
|
Microsoft Office Remote Code Execution Vulnerability
|
['microsoft office remote code execution']
|
CVE-2024-20674
|
Windows Kerberos Security Feature Bypass Vulnerability
|
['Security Feature Bypass', 'windows kerberos security feature bypass']
|
CVE-2024-20675
|
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
|
['Security Feature Bypass', 'security feature bypass']
|
CVE-2024-20676
|
Azure Storage Mover Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-20677
|
A security vulnerability exists in FBX that could lead to remote code execution. To mitigate this vulnerability, the ability to insert FBX files has been disabled in Word, Excel, PowerPoint and Outlook for Windows and Mac. Versions of Office that had this feature enabled will no longer have access to it. This includes Office 2019, Office 2021, Office LTSC for Mac 2021, and Microsoft 365. As of February 13, 2024, the ability to insert FBX files has also been disabled in 3D Viewer.3D models in Office documents that were previously inserted from a FBX file will continue to work as expected unless the Link to File option was chosen at insert time.This change is effective as of the January 9, 2024 security update.
|
['remote code execution']
|
CVE-2024-20679
|
Azure Stack Hub Spoofing Vulnerability
|
['azure stack hub spoofing']
|
CVE-2024-2068
|
A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /endpoint/update-computer.php. The manipulation of the argument model leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255383.
|
['cross site scripting']
|
CVE-2024-20680
|
Windows Message Queuing Client (MSMQC) Information Disclosure
|
['information disclosure']
|
CVE-2024-20681
|
Windows Subsystem for Linux Elevation of Privilege Vulnerability
|
['windows subsystem for linux elevation of privilege']
|
CVE-2024-20682
|
Windows Cryptographic Services Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-20683
|
Win32k Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-20684
|
Windows Hyper-V Denial of Service Vulnerability
|
['denial of service']
|
CVE-2024-20686
|
Win32k Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-20687
|
Microsoft AllJoyn API Denial of Service Vulnerability
|
['denial of service']
|
CVE-2024-2069
|
A vulnerability classified as critical has been found in SourceCodester FAQ Management System 1.0. Affected is an unknown function of the file /endpoint/delete-faq.php. The manipulation of the argument faq leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255384.
|
['sql injection']
|
CVE-2024-20690
|
Windows Nearby Sharing Spoofing Vulnerability
|
['windows nearby sharing spoofing']
|
CVE-2024-20691
|
Windows Themes Information Disclosure Vulnerability
|
['information disclosure']
|
CVE-2024-20692
|
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
|
['information disclosure']
|
CVE-2024-20694
|
Windows CoreMessaging Information Disclosure Vulnerability
|
['information disclosure']
|
CVE-2024-20695
|
Skype for Business Information Disclosure Vulnerability
|
['information disclosure']
|
CVE-2024-20696
|
Windows Libarchive Remote Code Execution Vulnerability
|
['windows libarchive remote code execution']
|
CVE-2024-20697
|
Windows Libarchive Remote Code Execution Vulnerability
|
['windows libarchive remote code execution']
|
CVE-2024-20698
|
Windows Kernel Elevation of Privilege Vulnerability
|
['windows kernel elevation of privilege']
|
CVE-2024-20699
|
Windows Hyper-V Denial of Service Vulnerability
|
['denial of service']
|
CVE-2024-2070
|
A vulnerability classified as problematic was found in SourceCodester FAQ Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /endpoint/add-faq.php. The manipulation of the argument question/answer leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255385 was assigned to this vulnerability.
|
['cross site scripting']
|
CVE-2024-20700
|
Windows Hyper-V Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-20709
|
Acrobat Reader T5 (MSFT Edge) versions 120.0.2210.91 and earlier are affected by an Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
['improper input validation', 'application denial-of-service', 'denial of service']
|
CVE-2024-2071
|
A vulnerability, which was classified as problematic, has been found in SourceCodester FAQ Management System 1.0. Affected by this issue is some unknown functionality of the component Update FAQ. The manipulation of the argument Frequently Asked Question leads to cross site scripting. The attack may be launched remotely. VDB-255386 is the identifier assigned to this vulnerability.
|
['cross site scripting']
|
CVE-2024-20710
|
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
['bypass mitigations such as ASLR', 'out-of-bounds read', 'out of bounds read', 'disclosure']
|
CVE-2024-20711
|
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
['bypass mitigations such as ASLR', 'out-of-bounds read', 'out of bounds read', 'disclosure']
|
CVE-2024-20712
|
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
['bypass mitigations such as ASLR', 'out-of-bounds read', 'out of bounds read', 'disclosure']
|
CVE-2024-20713
|
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
['bypass mitigations such as ASLR', 'out-of-bounds read', 'out of bounds read', 'disclosure']
|
CVE-2024-20714
|
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
['bypass mitigations such as ASLR', 'out-of-bounds read', 'out of bounds read', 'disclosure']
|
CVE-2024-20715
|
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
['bypass mitigations such as ASLR', 'out-of-bounds read', 'out of bounds read', 'disclosure']
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.