Category: CVE

CVE-2024-20527 | Cisco Identity Services Engine Software up to 3.4.0 API path traversal (cisco-sa-ise-multi-vuln-DBQdWRy)

A vulnerability, which was classified as critical, has been found in Cisco Identity Services Engine Software. This issue affects some unknown processing of the component API. The manipulation leads to path traversal. The identification of this vulnerability is CVE-2024-20527. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2024-20528 | Cisco Identity Services Engine Software up to 3.3.0 API path traversal (cisco-sa-ise-multi-vuln-DBQdWRy)

A vulnerability classified as critical was found in Cisco Identity Services Engine Software. This vulnerability affects unknown code of the component API. The manipulation leads to path traversal. This vulnerability was named CVE-2024-20528. The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2024-20445 | Cisco Video Phone 8875 up to 14.2(1)SR3 Session Initiation Protocol information disclosure (cisco-sa-phone-infodisc-sbyqQVbG)

A vulnerability classified as problematic has been found in Cisco Desk Phone 9800, IP Phone 7800, IP Phone 8800 and Video Phone 8875. This affects an unknown part of the component Session Initiation Protocol Handler. The manipulation leads to information disclosure. This vulnerability is uniquely identified as CVE-2024-20445. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2024-20457 | Cisco Unified Communications Manager IM and Presence Service information disclosure (cisco-sa-imp-inf-disc-cUPKuA5n)

A vulnerability was found in Cisco Unified Communications Manager IM and Presence Service. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to information disclosure. This vulnerability is handled as CVE-2024-20457. The attack may be launched remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2024-10928 | MonoCMS up to 20240528 Posts Page /monofiles/opensaved.php filtcategory/filtstatus cross site scripting

A vulnerability was found in MonoCMS up to 20240528. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /monofiles/opensaved.php of the component Posts Page. The manipulation of the argument filtcategory/filtstatus leads to cross site scripting. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. This vulnerability is known as CVE-2024-10928. The attack can be launched remotely. Furthermore, there is an exploit available. The vendor was contacted early about this disclosure but did not respond in any way. The vendor was contacted early about this disclosure but did not respond in any...

Read More

CVE-2024-10927 | MonoCMS up to 20240528 Account Information Page /monofiles/account.php userid cross site scripting

A vulnerability was found in MonoCMS up to 20240528. It has been classified as problematic. Affected is an unknown function of the file /monofiles/account.php of the component Account Information Page. The manipulation of the argument userid leads to cross site scripting. This vulnerability is traded as CVE-2024-10927. It is possible to launch the attack remotely. Furthermore, there is an exploit available. The vendor was contacted early about this disclosure but did not respond in any way. The vendor was contacted early about this disclosure but did not respond in any...

Read More

CVE-2024-10926 | IBPhoenix ibWebAdmin up to 1.0.2 Tabelas Section /toggle_fold_panel.php cross site scripting

A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /toggle_fold_panel.php of the component Tabelas Section. The manipulation of the argument p leads to cross site scripting. The identification of this vulnerability is CVE-2024-10926. The attack may be initiated remotely. Furthermore, there is an exploit available. The vendor was contacted early about this disclosure but did not respond in any way. The vendor was contacted early about this disclosure but did not respond in any...

Read More

CVE-2024-51504 | Apache ZooKeeper up to 3.9.2 HTTP Request Header improper authentication

A vulnerability has been found in Apache ZooKeeper up to 3.9.2 and classified as critical. This vulnerability affects unknown code of the component HTTP Request Header Handler. The manipulation leads to improper authentication. This vulnerability was named CVE-2024-51504. The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2024-50341 | Symfony Security::login improper authentication

A vulnerability, which was classified as critical, was found in Symfony. This affects the function Security::login. The manipulation leads to improper authentication. This vulnerability is uniquely identified as CVE-2024-50341. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2024-50340 | Symfony input validation

A vulnerability, which was classified as critical, has been found in Symfony. Affected by this issue is some unknown functionality. The manipulation leads to improper input validation. This vulnerability is handled as CVE-2024-50340. The attack may be launched remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2024-10081 | Ericsson CodeChecker up to 6.24.1 API Endpoint /Authentication authentication bypass

A vulnerability classified as critical has been found in Ericsson CodeChecker up to 6.24.1. Affected is an unknown function of the file /Authentication of the component API Endpoint. The manipulation leads to authentication bypass using alternate channel. This vulnerability is traded as CVE-2024-10081. It is possible to launch the attack remotely. There is no exploit...

Read More
Loading