Categoria: CVE

CVE-2024-10081 | Ericsson CodeChecker up to 6.24.1 API Endpoint /Authentication authentication bypass

A vulnerability classified as critical has been found in Ericsson CodeChecker up to 6.24.1. Affected is an unknown function of the file /Authentication of the component API Endpoint. The manipulation leads to authentication bypass using alternate channel. This vulnerability is traded as CVE-2024-10081. It is possible to launch the attack remotely. There is no exploit...

Per saperne di più

CVE-2024-35146 | IBM Maximo Application Suite 8.10.11/8.11.8/9.0.0 Monitor cross site scripting

A vulnerability was found in IBM Maximo Application Suite 8.10.11/8.11.8/9.0.0. It has been rated as problematic. This issue affects some unknown processing of the component Monitor. The manipulation leads to cross site scripting. The identification of this vulnerability is CVE-2024-35146. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-10168 | realmag777 Active Products Tables for WooCommerce Plugin up to 1.0.6.4 on WordPress Shortcode woot_button cross site scripting

A vulnerability was found in realmag777 Active Products Tables for WooCommerce Plugin up to 1.0.6.4 on WordPress. It has been classified as problematic. This affects the function woot_button of the component Shortcode Handler. The manipulation leads to cross site scripting. This vulnerability is uniquely identified as CVE-2024-10168. It is possible to initiate the attack remotely. There is no exploit...

Per saperne di più

CVE-2024-10920 | mariazevedo88 travels-java-api up to 5.0.1 JWT Secret JwtAuthenticationTokenFilter.java doFilterInternal hard-coded key

A vulnerability was found in mariazevedo88 travels-java-api up to 5.0.1 and classified as problematic. Affected by this issue is the function doFilterInternal of the file travels-java-api-mastersrcmainjavaiogithubmariazevedo88travelsjavaapifiltersJwtAuthenticationTokenFilter.java of the component JWT Secret Handler. The manipulation leads to use of hard-coded cryptographic key . This vulnerability is handled as CVE-2024-10920. The attack may be launched remotely. Furthermore, there is an exploit...

Per saperne di più

CVE-2024-10919 | didi Super-Jacoco 1.0 /cov/triggerUnitCover uuid os command injection

A vulnerability has been found in didi Super-Jacoco 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /cov/triggerUnitCover. The manipulation of the argument uuid leads to os command injection. This vulnerability is known as CVE-2024-10919. The attack can be launched remotely. Furthermore, there is an exploit...

Per saperne di più

CVE-2024-10916 | D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L up to 20241028 HTTP GET Request /xml/info.xml information disclosure

A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. This affects an unknown part of the file /xml/info.xml of the component HTTP GET Request Handler. The manipulation leads to information disclosure. This vulnerability is uniquely identified as CVE-2024-10916. It is possible to initiate the attack remotely. Furthermore, there is an exploit available. It is recommended to apply restrictive...

Per saperne di più

CVE-2024-10915 | D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L up to 20241028 account_mgr.cgi?cmd=cgi_user_add group os command injection

A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection. This vulnerability is handled as CVE-2024-10915. The attack may be launched remotely. Furthermore, there is an exploit available. It is recommended to apply restrictive...

Per saperne di più

CVE-2024-10914 | D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L up to 20241028 account_mgr.cgi?cmd=cgi_user_add name os command injection

A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. This vulnerability is known as CVE-2024-10914. The attack can be launched remotely. Furthermore, there is an exploit available. It is recommended to apply restrictive...

Per saperne di più
Caricamento