CVE
stringlengths 13
16
| Description
stringlengths 20
3.95k
| KeyPhrases
stringlengths 2
343
|
---|---|---|
CVE-2024-23910 | Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier. | ['hijack the authentication of administrators and to perform', 'cross-site request forgery (csrf)', 'cross site request forgery'] |
CVE-2024-23917 | In JetBrains TeamCity before 2023.11.3 authentication bypass leading to RCE was possible | ['bypass leading to RCE was possible', 'authentication bypass', 'rce'] |
CVE-2024-2392 | The Blocksy Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Newsletter widget in all versions up to, and including, 2.0.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | ['inject arbitrary web scripts', 'stored cross-site scripting'] |
CVE-2024-2393 | A vulnerability was found in SourceCodester CRUD without Page Reload 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file add_user.php. The manipulation of the argument city leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256453 was assigned to this vulnerability. | ['sql injection'] |
CVE-2024-2394 | A vulnerability was found in SourceCodester Employee Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Admin/add-admin.php. The manipulation of the argument avatar leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-256454 is the identifier assigned to this vulnerability. | ['unrestricted upload'] |
CVE-2024-23940 | Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system. | ['impersonate and modify a library to execute code', 'dll hijacking proxying', 'escalate privilege'] |
CVE-2024-23941 | Cross-site scripting vulnerability exists in Group Office prior to v6.6.182, prior to v6.7.64 and prior to v6.8.31, which may allow a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product. | ['execute an arbitrary script on the web browser', 'cross-site scripting', 'execute arbitrary'] |
CVE-2024-23944 | Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical.Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue. | ['monitor child znodes by attaching a persistent watcher', 'information disclosure', 'sensitive information'] |
CVE-2024-23946 | Possible path traversal in Apache OFBiz allowing file inclusion.Users are recommended to upgrade to version 18.12.12, that fixes the issue. | ['upgrade to version 18.12.12', 'path traversal', 'file inclusion'] |
CVE-2024-2395 | The Bulgarisation for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.14. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to generate and delete labels via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | ['cross-site request forgery'] |
CVE-2024-23952 | This is a duplicate for CVE-2023-46104. With correct CVE version ranges for affected Apache Superset. Uncontrolled resource consumption can be triggered by authenticated attacker that uploads a malicious ZIP to import database, dashboards or datasets. This vulnerability exists in Apache Superset versions up to and including 2.1.2 and versions 3.0.0, 3.0.1. | ['uncontrolled resource consumption'] |
CVE-2024-23975 | SQL injection vulnerability exists in GetDIAE_slogListParameters. | ['sql injection'] |
CVE-2024-23976 | When running in Appliance mode, an authenticated attacker assigned the Administrator role may be able to bypass Appliancemode restrictions utilizing iAppsLX templates on a BIG-IP system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | ['bypass Appliancemode restrictions', 'iappslx templates'] |
CVE-2024-23978 | Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. By processing invalid values, arbitrary code may be executed. Note that the affected products are no longer supported. | ['heap-based buffer overflow', 'heap based buffer overflow', 'arbitrary code'] |
CVE-2024-23979 | When SSL Client Certificate LDAP or Certificate Revocation List Distribution Point (CRLDP) authentication profile is configured on a virtual server, undisclosed requests can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | ['undisclosed requests', 'cpu resource utilization'] |
CVE-2024-2398 | When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application. | ['HTTP/2 server push', 'leak memory'] |
CVE-2024-23982 | When a BIG-IP PEM classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This issue affects classification engines using signatures released between 09-08-2022 and 02-16-2023. See the table in the F5 Security Advisory for a complete list of affected classification signature files.NOTE:Software versions which have reached End of Technical Support (EoTS) are not evaluated | ['undisclosed requests'] |
CVE-2024-23985 | EzServer 6.4.017 allows a denial of service (daemon crash) via a long string, such as one for the RNTO command. | ['denial of service (daemon crash)', 'a denial of service (daemon crash)', 'long string'] |
CVE-2024-2399 | The Premium Addons PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 4.10.23 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | ['inject arbitrary web scripts', 'stored cross-site scripting'] |
CVE-2024-2400 | Use after free in Performance Manager in Google Chrome prior to 122.0.6261.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | ['use after free', 'heap corruption'] |
CVE-2024-24000 | jshERP v3.3 is vulnerable to Arbitrary File Upload. The jshERP-boot/systemConfig/upload interface does not check the uploaded file type, and the biz parameter can be spliced into the upload path, resulting in arbitrary file uploads with controllable paths. | ['arbitrary file upload'] |
CVE-2024-24001 | jshERP v3.3 is vulnerable to SQL Injection. via the com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findallocationDetail() function of jshERP which allows an attacker to construct malicious payload to bypass jshERP's protection mechanism. | ["bypass jshERP's protection", "construct malicious payload to bypass jshERP's protection", 'sql injection'] |
CVE-2024-24002 | jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection. | ["bypass jshERP's protection", 'sql injection'] |
CVE-2024-24003 | jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutMaterialCount() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection. | ["bypass jshERP's protection", 'sql injection'] |
CVE-2024-24004 | jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutDetail() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection. | ["bypass jshERP's protection", 'sql injection'] |
CVE-2024-24013 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass crafted offset, limit, and sort parameters to perform SQL injection via /novel/pay/list | ['sql injection'] |
CVE-2024-24014 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass crafted offset, limit, and sort parameters to perform SQL injection via /novel/author/list | ['sql injection'] |
CVE-2024-24015 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL via /sys/user/exit | ['sql injection'] |
CVE-2024-24017 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass crafted offset, limit, and sort parameters to perform SQL injection via /common/dict/list | ['sql injection'] |
CVE-2024-24018 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL injection via /system/dataPerm/list | ['sql injection'] |
CVE-2024-24019 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL injection via /system/roleDataPerm/list | ['sql injection'] |
CVE-2024-24021 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior. An attacker can pass specially crafted offset, limit, and sort parameters to perform SQL injection via /novel/userFeedback/list. | ['sql injection'] |
CVE-2024-24023 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior. An attacker can pass specially crafted offset, limit, and sort parameters to perform SQL injection via /novel/bookContent/list. | ['sql injection'] |
CVE-2024-24024 | An arbitrary File download vulnerability exists in Novel-Plus v4.3.0-RC1 and prior at com.java2nb.common.controller.FileController: fileDownload(). An attacker can pass in specially crafted filePath and fieName parameters to perform arbitrary File download. | ['perform arbitrary File download', 'file download'] |
CVE-2024-24025 | An arbitrary File upload vulnerability exists in Novel-Plus v4.3.0-RC1 and prior at com.java2nb.common.controller.FileController: upload(). An attacker can pass in specially crafted filename parameter to perform arbitrary File download. | ['perform arbitrary File download', 'file upload'] |
CVE-2024-24026 | An arbitrary File upload vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions at com.java2nb.system.controller.SysUserController: uploadImg(). An attacker can pass in specially crafted filename parameter to perform arbitrary File download. | ['perform arbitrary File download', 'file upload'] |
CVE-2024-24027 | SQL Injection vulnerability in Likeshop before 2.5.7 allows attackers to run abitrary SQL commands via the function DistributionMemberLogic::getFansLists. | ['run abitrary SQL commands via the function DistributionMemberLogic::getFansLists', 'sql injection'] |
CVE-2024-24028 | Server Side Request Forgery (SSRF) vulnerability in Likeshop before 2.5.7 allows attackers to view sensitive information via the avatar parameter in function UserLogic::updateWechatInfo. | ['view sensitive information via the avatar parameter in', 'server side request forgery (ssrf)'] |
CVE-2024-24029 | JFinalCMS 5.0.0 is vulnerable to SQL injection via /admin/content/data. | ['sql injection'] |
CVE-2024-2403 | Improper cleanup in temporary file handling component in Devolutions Remote Desktop Manager 2024.1.12 andearlier on Windows allows an attacker that compromised a user endpoint, under specific circumstances, to access sensitive information via residual files in the temporary directory. | ['access sensitive information via residual files in the', 'improper cleanup'] |
CVE-2024-24034 | Setor Informatica S.I.L version 3.0 is vulnerable to Open Redirect via the hprinter parameter, allows remote attackers to execute arbitrary code. | ['execute arbitrary code', 'open redirect'] |
CVE-2024-24035 | Cross Site Scripting (XSS) vulnerability in Setor Informatica SIL 3.1 allows attackers to run arbitrary code via the hmessage parameter. | ['run arbitrary code', 'run arbitrary code via the hmessage parameter', 'cross site scripting (xss)'] |
CVE-2024-24041 | A stored cross-site scripting (XSS) vulnerability in Travel Journal Using PHP and MySQL with Source Code v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the location parameter at /travel-journal/write-journal.php. | ['execute arbitrary web scripts or HTML', 'execute arbitrary web scripts or HTML via a', 'stored cross-site scripting (xss)'] |
CVE-2024-24042 | Directory Traversal vulnerability in Devan-Kerman ARRP v.0.8.1 and before allows a remote attacker to execute arbitrary code via the dumpDirect in RuntimeResourcePackImpl component. | ['execute arbitrary code', 'execute arbitrary code via the dumpDirect in RuntimeResourcePackImpl', 'directory traversal'] |
CVE-2024-24043 | Directory Traversal vulnerability in Speedy11CZ MCRPX v.1.4.0 and before allows a local attacker to execute arbitrary code via a crafted file. | ['execute arbitrary code', 'execute arbitrary code via a crafted file', 'directory traversal'] |
CVE-2024-24050 | Cross Site Scripting (XSS) vulnerability in Sourcecodester Workout Journal App 1.0 allows attackers to run arbitrary code via parameters firstname and lastname in /add-user.php. | ['run arbitrary code', 'run arbitrary code via parameters firstname and lastname', 'cross site scripting (xss)'] |
CVE-2024-24059 | springboot-manager v1.6 is vulnerable to Arbitrary File Upload. The system does not filter the suffixes of uploaded files. | ['arbitrary file upload'] |
CVE-2024-2406 | A vulnerability, which was classified as critical, was found in Gacjie Server up to 1.0. This affects the function index of the file /app/admin/controller/Upload.php. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256503. | ['unrestricted upload'] |
CVE-2024-24060 | springboot-manager v1.6 is vulnerable to Cross Site Scripting (XSS) via /sys/user. | ['cross site scripting (xss)'] |
CVE-2024-24061 | springboot-manager v1.6 is vulnerable to Cross Site Scripting (XSS) via /sysContent/add. | ['cross site scripting (xss)'] |
CVE-2024-24062 | springboot-manager v1.6 is vulnerable to Cross Site Scripting (XSS) via /sys/role. | ['cross site scripting (xss)'] |
CVE-2024-2409 | The MasterStudy LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.3.1. This is due to insufficient validation checks within the _register_user() function called by the 'wp_ajax_nopriv_stm_lms_register' AJAX action. This makes it possible for unauthenticated attackers to register a user with administrator-level privileges when MasterStudy LMS Pro is installed and the LMS Forms Editor add-on is enabled. | ['privilege escalation'] |
CVE-2024-24091 | Yealink Meeting Server before v26.0.0.66 was discovered to contain an OS command injection vulnerability via the file upload interface. | ['os command injection', 'file upload'] |
CVE-2024-24092 | SQL Injection vulnerability in Code-projects.org Scholars Tracking System 1.0 allows attackers to run arbitrary code via login.php. | ['run arbitrary code', 'run arbitrary code via login.php', 'sql injection'] |
CVE-2024-24093 | SQL Injection vulnerability in Code-projects Scholars Tracking System 1.0 allows attackers to run arbitrary code via Personal Information Update information. | ['run arbitrary code', 'run arbitrary code via Personal Information Update information', 'sql injection'] |
CVE-2024-24095 | Code-projects Simple Stock System 1.0 is vulnerable to SQL Injection. | ['sql injection'] |
CVE-2024-24096 | Code-projects Computer Book Store 1.0 is vulnerable to SQL Injection via BookSBIN. | ['sql injection'] |
CVE-2024-24097 | Cross Site Scripting (XSS) vulnerability in Code-projects Scholars Tracking System 1.0 allows attackers to run arbitrary code via the News Feed. | ['run arbitrary code', 'run arbitrary code via the News Feed', 'cross site scripting (xss)'] |
CVE-2024-24098 | Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection via the News Feed. | ['sql injection'] |
CVE-2024-24099 | Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection under Employment Status Information Update. | ['sql injection'] |
CVE-2024-24100 | Code-projects Computer Book Store 1.0 is vulnerable to SQL Injection via PublisherID. | ['sql injection'] |
CVE-2024-24101 | Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection under Eligibility Information Update. | ['sql injection'] |
CVE-2024-24105 | SQL Injection vulnerability in Code-projects Computer Science Time Table System 1.0 allows attackers to run arbitrary code via adminFormvalidation.php. | ['run arbitrary code', 'run arbitrary code via adminFormvalidation.php', 'sql injection'] |
CVE-2024-2411 | The MasterStudy LMS plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.0 via the 'modal' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other safe file types can be uploaded and included. | ['execute arbitrary files', 'bypass access controls', 'obtain sensitive data', 'local file inclusion', 'code execution'] |
CVE-2024-24110 | SQL Injection vulnerability in crmeb_java before v1.3.4 allows attackers to run arbitrary SQL commands via crafted GET request to the component /api/front/spread/people. | ['run arbitrary SQL commands', 'run arbitrary SQL commands via crafted GET request', 'sql injection'] |
CVE-2024-24112 | xmall v1.1 was discovered to contain a SQL injection vulnerability via the orderDir parameter. | ['sql injection'] |
CVE-2024-24113 | xxl-job =< 2.4.1 has a Server-Side Request Forgery (SSRF) vulnerability, which causes low-privileged users to control executor to RCE. | ['server-side request forgery (ssrf)', 'rce'] |
CVE-2024-24115 | A stored cross-site scripting (XSS) vulnerability in the Edit Page function of Cotonti CMS v0.9.24 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload. | ['execute arbitrary web scripts or HTML', 'execute arbitrary web scripts or HTML via a', 'stored cross-site scripting (xss)'] |
CVE-2024-2412 | The disabling function of the user registration page for Heimavista Rpage and Epage is not properly implemented, allowing remote attackers to complete user registration on sites where user registration is supposed to be disabled. | ['complete user registration on sites where user registration'] |
CVE-2024-2413 | Intumit SmartRobot uses a fixed encryption key for authentication. Remote attackers can use this key to encrypt a string composed of the user's name and timestamp to generate an authentication code. With this authentication code, they can obtain administrator privileges and subsequently execute arbitrary code on the remote server using built-in system functionality. | ['execute arbitrary code', 'obtain administrator privileges'] |
CVE-2024-24130 | Mail2World v12 Business Control Center was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Usr parameter at resellercenter/login.asp. | ['reflected cross-site scripting (xss)'] |
CVE-2024-24131 | SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php. | ['reflected cross-site scripting (xss)'] |
CVE-2024-24133 | Atmail v6.6.0 was discovered to contain a SQL injection vulnerability via the username parameter on the login page. | ['sql injection'] |
CVE-2024-24134 | Sourcecodester Online Food Menu 1.0 is vulnerable to Cross Site Scripting (XSS) via the 'Menu Name' and 'Description' fields in the Update Menu section. | ['cross site scripting (xss)'] |
CVE-2024-24135 | Product Name and Product Code in the 'Add Product' section of Sourcecodester Product Inventory with Export to Excel 1.0 are vulnerable to XSS attacks. | ['xss'] |
CVE-2024-24136 | The 'Your Name' field in the Submit Score section of Sourcecodester Math Game with Leaderboard v1.0 is vulnerable to Cross-Site Scripting (XSS) attacks. | ['cross-site scripting (xss)'] |
CVE-2024-24139 | Sourcecodester Login System with Email Verification 1.0 allows SQL Injection via the 'user' parameter. | ["SQL Injection via the 'user' parameter", 'sql injection'] |
CVE-2024-2414 | The primary channel is unprotected on Movistar 4G router affecting E version S_WLD71-T1_v2.0.201820. This device has the 'adb' service open on port 5555 and provides access to a shell with root privileges. | ['primary channel', 'root privilege'] |
CVE-2024-24140 | Sourcecodester Daily Habit Tracker App 1.0 allows SQL Injection via the parameter 'tracker.' | ["SQL Injection via the parameter 'tracker", 'sql injection'] |
CVE-2024-24141 | Sourcecodester School Task Manager App 1.0 allows SQL Injection via the 'task' parameter. | ["SQL Injection via the 'task' parameter", 'sql injection'] |
CVE-2024-24142 | Sourcecodester School Task Manager 1.0 allows SQL Injection via the 'subject' parameter. | ["SQL Injection via the 'subject' parameter", 'sql injection'] |
CVE-2024-24146 | A memory leak issue discovered in parseSWF_DEFINEBUTTON in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file. | ['cause s denial of service via a crafted', 'memory leak'] |
CVE-2024-24147 | A memory leak issue discovered in parseSWF_FILLSTYLEARRAY in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file. | ['cause s denial of service via a crafted', 'memory leak'] |
CVE-2024-24148 | A memory leak issue discovered in parseSWF_FREECHARACTER in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | ['cause a denial of service via a crafted', 'memory leak'] |
CVE-2024-24149 | A memory leak issue discovered in parseSWF_GLYPHENTRY in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | ['cause a denial of service via a crafted', 'memory leak'] |
CVE-2024-2415 | Command injection vulnerability in Movistar 4G router affecting version ES_WLD71-T1_v2.0.201820. This vulnerability allows an authenticated user to execute commands inside the router by making a POST request to the URL '/cgi-bin/gui.cgi'. | ['execute commands inside the router by making a', 'command injection'] |
CVE-2024-24150 | A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | ['cause a denial of service via a crafted', 'memory leak'] |
CVE-2024-24155 | Bento4 v1.5.1-628 contains a Memory leak on AP4_Movie::AP4_Movie, parsing tracks and added into m_Tracks list, but mp42aac cannot correctly delete when we got an no audio track found error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file. | ['Denial of Service (DoS)', 'cause a Denial of Service (DoS)', 'memory leak', 'denial of service (dos)'] |
CVE-2024-24156 | Cross Site Scripting (XSS) vulnerability in Gnuboard g6 before Github commit 58c737a263ac0c523592fd87ff71b9e3c07d7cf5, allows remote attackers execute arbitrary code via the wr_content parameter. | ['execute arbitrary code', 'remote attackers execute arbitrary code via the wr_content', 'cross site scripting (xss)'] |
CVE-2024-2416 | Cross-Site Request Forgery vulnerability in Movistar's 4G router affecting version ES_WLD71-T1_v2.0.201820. This vulnerability allows an attacker to force an end user to execute unwanted actions in a web application in which they are currently authenticated. | ['force an end user to execute unwanted actions', 'cross-site request forgery'] |
CVE-2024-24160 | MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do. | ['cross-site scripting (xss)'] |
CVE-2024-24161 | MRCMS 3.0 contains an Arbitrary File Read vulnerability in /admin/file/edit.do as the incoming path parameter is not filtered. | ['arbitrary file read'] |
CVE-2024-2418 | A vulnerability was found in SourceCodester Best POS Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view_order.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256705 was assigned to this vulnerability. | ['sql injection'] |
CVE-2024-24186 | Jsish v3.5.0 (commit 42c694c) was discovered to contain a stack-overflow via the component IterGetKeysCallback at /jsish/src/jsiValue.c. | ['stack-overflow', 'stack overflow'] |
CVE-2024-24188 | Jsish v3.5.0 was discovered to contain a heap-buffer-overflow in ./src/jsiUtils.c. | ['heap-buffer-overflow', 'heap buffer overflow'] |
CVE-2024-24189 | Jsish v3.5.0 (commit 42c694c) was discovered to contain a use-after-free via the SplitChar at ./src/jsiUtils.c. | ['use-after-free', 'use after free'] |
CVE-2024-24202 | An arbitrary file upload vulnerability in /upgrade/control.php of ZenTao Community Edition v18.10, ZenTao Biz v8.10, and ZenTao Max v4.10 allows attackers to execute arbitrary code via uploading a crafted .txt file. | ['execute arbitrary code', 'execute arbitrary code via uploading a crafted .txt', 'arbitrary file upload'] |
CVE-2024-24213 | Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query. NOTE: the vendor's position is that this is an intended feature; also, it exists in the Supabase dashboard product, not the Supabase PostgreSQL product. Specifically, /pg_meta/default/query is for SQL queries that are entered in an intended UI by an authorized user. Nothing is injected. | ['sql injection'] |
CVE-2024-24215 | An issue in the component /cgi-bin/GetJsonValue.cgi of Cellinx NVT Web Server 5.0.0.014 allows attackers to leak configuration information via a crafted POST request. | ['leak configuration information via a crafted POST request'] |
CVE-2024-24216 | Zentao v18.0 to v18.10 was discovered to contain a remote code execution (RCE) vulnerability via the checkConnection method of /app/zentao/module/repo/model.php. | ['remote code execution (rce)'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.