|
305861
|
- |
|
-
|
-
|
UnoPim 0.1.3 and below is vulnerable to Cross Site Scripting (XSS) in the Create User function. This allows attackers to perform XSS via an SVG document, which can be used to steal cookies.
|
-
|
CVE-2024-50637
|
2024-11-7 23:15 |
2024-11-7 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
305862
|
5.5 |
MEDIUM
Local
|
linux
|
linux_kernel
|
In the Linux kernel, the following vulnerability has been resolved:
ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event
With clang's kernel control flow integrity (kCFI, CONFIG_C…
|
NVD-CWE-noinfo
|
CVE-2022-48994
|
2024-11-7 22:52 |
2024-10-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
305863
|
7.8 |
HIGH
Local
|
2n
|
access_commander
|
In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrary
code execution with root permissions.
|
NVD-CWE-noinfo
|
CVE-2024-47255
|
2024-11-7 21:15 |
2024-11-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
305864
|
7.2 |
HIGH
Network
|
2n
|
access_commander
|
In 2N Access Commander versions 3.1.1.2 and prior, an Insufficient
Verification of Data Authenticity vulnerability could allow an attacker
to escalate their privileges and gain root access to the s…
|
NVD-CWE-noinfo
|
CVE-2024-47254
|
2024-11-7 21:15 |
2024-11-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
305865
|
7.2 |
HIGH
Network
|
2n
|
access_commander
|
In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker with administrative privileges to write files on the filesystem and potentially achieve arbit…
|
CWE-22
Path Traversal
|
CVE-2024-47253
|
2024-11-7 21:15 |
2024-11-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
305866
|
8.8 |
HIGH
Network
|
zohocorp
|
manageengine_adaudit_plus
|
Zohocorp ManageEngine ADAudit Plus versions below 8121 are vulnerable to SQL Injection in Technician reports option.
|
CWE-89
SQL Injection
|
CVE-2024-36485
|
2024-11-7 20:15 |
2024-11-4 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
305867
|
- |
|
-
|
-
|
In OpenStack Ironic before 26.0.1 and ironic-python-agent before 9.13.1, there is a vulnerability in image processing, in which a crafted image could be used by an authenticated user to exploit undes…
|
-
|
CVE-2024-44082
|
2024-11-7 17:35 |
2024-09-6 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
305868
|
5.5 |
MEDIUM
Local
|
huawei
|
harmonyos
|
Vulnerability of input parameters not being verified in the HDC module
Impact: Successful exploitation of this vulnerability may affect availability.
|
NVD-CWE-noinfo
|
CVE-2024-51519
|
2024-11-7 08:15 |
2024-11-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
305869
|
7.5 |
HIGH
Network
|
huawei
|
harmonyos
|
Vulnerability of message types not being verified in the advanced messaging modul
Impact: Successful exploitation of this vulnerability may affect availability.
|
NVD-CWE-noinfo
|
CVE-2024-51518
|
2024-11-7 08:15 |
2024-11-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
305870
|
5.5 |
MEDIUM
Local
|
huawei
|
harmonyos
|
Vulnerability of improper memory access in the phone service module
Impact: Successful exploitation of this vulnerability may affect availability.
|
CWE-129
Improper Validation of Array Index
|
CVE-2024-51517
|
2024-11-7 08:15 |
2024-11-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|