Total
10666 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-1245 | 1 Concretecms | 1 Concrete Cms | 2024-02-15 | N/A | 4.8 MEDIUM |
Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS in file tags and description attributes since administrator entered file attributes are not sufficiently sanitized in the Edit Attributes page. A rogue administrator could put malicious code into the file tags or description attributes and, when another administrator opens the same file for editing, the malicious code could execute. The Concrete CMS Security team scored this 2.4 with CVSS v3 vector AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N. | |||||
CVE-2024-1247 | 1 Concretecms | 1 Concrete Cms | 2024-02-15 | N/A | 4.8 MEDIUM |
Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS via the Role Name field since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Role Name field which might be executed when users visit the affected page. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Concrete versions below 9 do not include group types so they are not affected by this vulnerability. | |||||
CVE-2022-1509 | 1 Hestiacp | 1 Control Panel | 2024-02-14 | 9.0 HIGH | 8.8 HIGH |
Sed Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context. | |||||
CVE-2024-0955 | 1 Tenable | 1 Nessus | 2024-02-14 | N/A | 4.8 MEDIUM |
A stored XSS vulnerability exists where an authenticated, remote attacker with administrator privileges on the Nessus application could alter Nessus proxy settings, which could lead to the execution of remote arbitrary scripts. | |||||
CVE-2023-22342 | 2024-02-14 | N/A | 7.7 HIGH | ||
Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2023-24463 | 2024-02-14 | N/A | 4.3 MEDIUM | ||
Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable information disclosure via adjacent access. | |||||
CVE-2023-28374 | 2024-02-14 | N/A | 6.1 MEDIUM | ||
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | |||||
CVE-2023-25951 | 2024-02-14 | N/A | 6.0 MEDIUM | ||
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access. | |||||
CVE-2023-34983 | 2024-02-14 | N/A | 4.3 MEDIUM | ||
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | |||||
CVE-2023-42776 | 2024-02-14 | N/A | 3.8 LOW | ||
Improper input validation in some Intel(R) SGX DCAP software for Windows before version 1.19.100.3 may allow an authenticateed user to potentially enable information disclosure via local access. | |||||
CVE-2024-24690 | 2024-02-14 | N/A | 5.4 MEDIUM | ||
Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access. | |||||
CVE-2024-24695 | 2024-02-14 | N/A | 6.8 MEDIUM | ||
Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access. | |||||
CVE-2024-24691 | 2024-02-14 | N/A | 9.6 CRITICAL | ||
Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access. | |||||
CVE-2024-24696 | 2024-02-14 | N/A | 6.8 MEDIUM | ||
Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access. | |||||
CVE-2005-1628 | 1 Web-app.org | 1 Webapp | 2024-02-14 | 7.5 HIGH | N/A |
apage.cgi in WebAPP 0.9.9.2.1, and possibly earlier versions, allows remote attackers to execute arbitrary commands via shell metacharacters in the f parameter. | |||||
CVE-2013-3925 | 1 Atlassian | 1 Crowd | 2024-02-14 | 5.8 MEDIUM | N/A |
Atlassian Crowd 2.5.x before 2.5.4, 2.6.x before 2.6.3, 2.3.8, and 2.4.9 allows remote attackers to read arbitrary files and send HTTP requests to intranet servers via a request to (1) /services/2 or (2) services/latest with a DTD containing an XML external entity declaration in conjunction with an entity reference. | |||||
CVE-2016-9564 | 1 Boa | 1 Boa | 2024-02-14 | 5.0 MEDIUM | 7.5 HIGH |
Buffer overflow in send_redirect() in Boa Webserver 0.92r allows remote attackers to DoS via an HTTP GET request requesting a long URI with only '/' and '.' characters. | |||||
CVE-2013-6618 | 1 Juniper | 1 Junos | 2024-02-14 | 9.0 HIGH | N/A |
jsdm/ajax/port.php in J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1 before 12.1R5, 12.2 before 12.2R3, and 12.3 before 12.3R1 allows remote authenticated users to execute arbitrary commands via the rsargs parameter in an exec action. | |||||
CVE-2017-14992 | 1 Docker | 1 Docker | 2024-02-14 | 4.3 MEDIUM | 6.5 MEDIUM |
Lack of content verification in Docker-CE (Also known as Moby) versions 1.12.6-0, 1.10.3, 17.03.0, 17.03.1, 17.03.2, 17.06.0, 17.06.1, 17.06.2, 17.09.0, and earlier allows a remote attacker to cause a Denial of Service via a crafted image layer payload, aka gzip bombing. | |||||
CVE-2016-4462 | 1 Apache | 1 Ofbiz | 2024-02-14 | 6.5 MEDIUM | 8.8 HIGH |
By manipulating the URL parameter externalLoginKey, a malicious, logged in user could pass valid Freemarker directives to the Template Engine that are reflected on the webpage; a specially crafted Freemarker template could be used for remote code execution. Mitigation: Upgrade to Apache OFBiz 16.11.01 |