Lucene search

K

BTV-EMUI5.0,Berlin-EMUI5.0,Berlin-L21,Berlin-L22,Berlin-L23,MHA-AL00A Security Vulnerabilities

osv
osv

Path traversal in webpack-dev-middleware

Summary The webpack-dev-middleware middleware does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. Details The middleware can either work with the physical filesystem when reading the files or it can.....

7.4CVSS

6.3AI Score

0.0004EPSS

2024-03-21 06:59 PM
8
github
github

Path traversal in webpack-dev-middleware

Summary The webpack-dev-middleware middleware does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. Details The middleware can either work with the physical filesystem when reading the files or it can.....

7.4CVSS

6.4AI Score

0.0004EPSS

2024-03-21 06:59 PM
10
nvd
nvd

CVE-2024-29180

Prior to versions 7.1.0, 6.1.2, and 5.3.4, the webpack-dev-middleware development middleware for devpack does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. The middleware can either work with the...

7.4CVSS

7.3AI Score

0.0004EPSS

2024-03-21 05:15 PM
2
osv
osv

CVE-2024-29180

Prior to versions 7.1.0, 6.1.2, and 5.3.4, the webpack-dev-middleware development middleware for devpack does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. The middleware can either work with the...

7.4CVSS

7.2AI Score

0.0004EPSS

2024-03-21 05:15 PM
5
cve
cve

CVE-2024-29180

Prior to versions 7.1.0, 6.1.2, and 5.3.4, the webpack-dev-middleware development middleware for devpack does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. The middleware can either work with the...

7.4CVSS

7AI Score

0.0004EPSS

2024-03-21 05:15 PM
46
cvelist
cvelist

CVE-2024-29180 webpack-dev-middleware Path Traversal vulnerability

Prior to versions 7.1.0, 6.1.2, and 5.3.4, the webpack-dev-middleware development middleware for devpack does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. The middleware can either work with the...

7.4CVSS

7.3AI Score

0.0004EPSS

2024-03-21 04:47 PM
nvd
nvd

CVE-2024-2479

A vulnerability classified as problematic has been found in MHA Sistemas arMHAzena 9.6.0.0. This affects an unknown part of the component Cadastro Page. The manipulation of the argument Query leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been...

3.5CVSS

3.6AI Score

0.0004EPSS

2024-03-15 06:15 AM
2
nvd
nvd

CVE-2024-2480

A vulnerability classified as critical was found in MHA Sistemas arMHAzena 9.6.0.0. This vulnerability affects unknown code of the component Executa Page. The manipulation of the argument Companhia/Planta/Agente de/Agente até leads to sql injection. The attack can be initiated remotely. The...

6.3CVSS

6.9AI Score

0.0004EPSS

2024-03-15 06:15 AM
2
cve
cve

CVE-2024-2480

A vulnerability classified as critical was found in MHA Sistemas arMHAzena 9.6.0.0. This vulnerability affects unknown code of the component Executa Page. The manipulation of the argument Companhia/Planta/Agente de/Agente até leads to sql injection. The attack can be initiated remotely. The...

6.3CVSS

7.4AI Score

0.0004EPSS

2024-03-15 06:15 AM
32
cve
cve

CVE-2024-2479

A vulnerability classified as problematic has been found in MHA Sistemas arMHAzena 9.6.0.0. This affects an unknown part of the component Cadastro Page. The manipulation of the argument Query leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been...

3.5CVSS

6AI Score

0.0004EPSS

2024-03-15 06:15 AM
29
cvelist
cvelist

CVE-2024-2480 MHA Sistemas arMHAzena Executa Page sql injection

A vulnerability classified as critical was found in MHA Sistemas arMHAzena 9.6.0.0. This vulnerability affects unknown code of the component Executa Page. The manipulation of the argument Companhia/Planta/Agente de/Agente até leads to sql injection. The attack can be initiated remotely. The...

6.3CVSS

7.1AI Score

0.0004EPSS

2024-03-15 06:00 AM
cvelist
cvelist

CVE-2024-2479 MHA Sistemas arMHAzena Cadastro Page cross site scripting

A vulnerability classified as problematic has been found in MHA Sistemas arMHAzena 9.6.0.0. This affects an unknown part of the component Cadastro Page. The manipulation of the argument Query leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been...

3.5CVSS

4AI Score

0.0004EPSS

2024-03-15 05:31 AM
cve
cve

CVE-2024-1397

The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's blocks in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on the 'titleTag' user supplied attributes. This makes it...

6.4CVSS

6AI Score

0.0004EPSS

2024-03-12 11:15 PM
35
nvd
nvd

CVE-2024-1397

The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's blocks in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on the 'titleTag' user supplied attributes. This makes it...

6.4CVSS

5.7AI Score

0.0004EPSS

2024-03-12 11:15 PM
cvelist
cvelist

CVE-2024-1397

The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's blocks in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on the 'titleTag' user supplied attributes. This makes it...

6.4CVSS

5.8AI Score

0.0004EPSS

2024-03-12 10:32 PM
osv
osv

`GetRepositoryByName`, `DeleteRepositoryByName` and `GetArtifactByName` allow access of arbitrary repositories in Minder by any authenticated user

Summary A Minder user can use the endpoints listed in the issue title to access any repository in the DB, irrespective of who owns the repo and any permissions that user may have. Details...

7.1CVSS

6.3AI Score

0.0004EPSS

2024-03-05 04:20 PM
8
github
github

`GetRepositoryByName`, `DeleteRepositoryByName` and `GetArtifactByName` allow access of arbitrary repositories in Minder by any authenticated user

Summary A Minder user can use the endpoints listed in the issue title to access any repository in the DB, irrespective of who owns the repo and any permissions that user may have. Details...

7.1CVSS

6.6AI Score

0.0004EPSS

2024-03-05 04:20 PM
7
cve
cve

CVE-2024-1058

The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the onclick parameter in all versions up to, and including, 1.58.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor...

6.4CVSS

6AI Score

0.0004EPSS

2024-02-29 01:43 AM
51
nvd
nvd

CVE-2024-1058

The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the onclick parameter in all versions up to, and including, 1.58.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor...

6.4CVSS

5.6AI Score

0.0004EPSS

2024-02-29 01:43 AM
openbugbounty
openbugbounty

berlin-en-ligne.com Cross Site Scripting vulnerability OBB-3859645

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

6.2AI Score

2024-02-26 12:01 PM
7
exploitdb

7.4AI Score

2024-02-26 12:00 AM
72
thn
thn

Russian Government Software Backdoored to Deploy Konni RAT Malware

An installer for a tool likely used by the Russian Consular Department of the Ministry of Foreign Affairs (MID) has been backdoored to deliver a remote access trojan called Konni RAT (aka UpDog). The findings come from German cybersecurity company DCSO, which linked the activity as originating...

9.4AI Score

2024-02-22 10:43 AM
15
packetstorm

7.4AI Score

0.0004EPSS

2024-02-21 12:00 AM
112
zdt
zdt

OpenOLAT 18.1.5 Cross Site Scripting / Privilege Escalation Vulnerabilities

OpenOLAT versions 18.1.4 and below and versions 18.1.5 and below suffer from multiple persistent cross site scripting...

6.3AI Score

0.0004EPSS

2024-02-21 12:00 AM
103
cvelist
cvelist

CVE-2024-1058

The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the onclick parameter in all versions up to, and including, 1.58.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor...

6.4CVSS

5.7AI Score

0.0004EPSS

2024-02-20 06:56 PM
filippoio
filippoio

Post-quantum Cryptography for the Go Ecosystem

filippo.io/mlkem768 is a pure-Go implementation of ML-KEM-768 optimized for correctness and readability. ML-KEM (formerly known as Kyber, renamed because we can't have nice things) is a post-quantum key exchange mechanism in the process of being standardized by NIST and adopted by most of the...

6.8AI Score

2024-01-30 05:48 PM
7
cve
cve

CVE-2023-6369

The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with...

5.4CVSS

5AI Score

0.001EPSS

2024-01-11 09:15 AM
45
nvd
nvd

CVE-2023-6369

The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with...

5.4CVSS

5AI Score

0.001EPSS

2024-01-11 09:15 AM
cve
cve

CVE-2023-6556

The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via currency options in all versions up to, and including, 1.4.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated...

5.4CVSS

5.2AI Score

0.001EPSS

2024-01-11 09:15 AM
26
nvd
nvd

CVE-2023-6556

The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via currency options in all versions up to, and including, 1.4.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated...

5.4CVSS

5.1AI Score

0.001EPSS

2024-01-11 09:15 AM
1
openbugbounty
openbugbounty

ehe-berlin-brandenburg.de Cross Site Scripting vulnerability OBB-3831741

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

6.2AI Score

2024-01-11 08:59 AM
3
cvelist
cvelist

CVE-2023-6556

The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via currency options in all versions up to, and including, 1.4.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated...

5.4CVSS

5.3AI Score

0.001EPSS

2024-01-11 08:32 AM
cvelist
cvelist

CVE-2023-6369

The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with...

5.4CVSS

5.3AI Score

0.001EPSS

2024-01-11 08:32 AM
mskb
mskb

Description of the security update for SharePoint Server Subscription Edition: January 9, 2024 (KB5002540)

Description of the security update for SharePoint Server Subscription Edition: January 9, 2024 (KB5002540) Summary This security update resolves a Microsoft SharePoint Server remote code execution vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and...

8.8CVSS

9AI Score

0.002EPSS

2024-01-09 08:00 AM
26
code423n4
code423n4

Leap year not accounted for OLAS and veOLAS contract

Lines of code https://github.com/code-423n4/2023-12-autonolas/blob/2a095eb1f8359be349d23af67089795fb0be4ed1/governance/contracts/veOLAS.sol#L101 Vulnerability details Impact OLAS and veOLAS contract does not account for years with 366 days in it's state variables uint256 public constant oneYear =.....

7AI Score

2024-01-08 12:00 AM
4
hackread
hackread

Researchers Crack Tesla Autopilot with ‘Elon Mode,’ Access Critical Data

By Deeba Ahmed German cybersecurity researchers from Technische Universität Berlin employed a €600 (£520 - $660) tool to gain root access to the ARM64-based circuit board of Tesla's autopilot. This is a post from HackRead.com Read the original post: Researchers Crack Tesla Autopilot with 'Elon...

7.5AI Score

2024-01-01 04:39 PM
17
osv
osv

ewen-lbh/ffcss Late-Unicode normalization vulnerability

Summary The function lookupPreprocess() is meant to apply some transformations to a string by disabling characters in the regex [-_ .]. However, due to the use of late Unicode normalization of type NFKD, it is possible to bypass that validation and re-introduce all the characters in the regex [-_.....

5.3CVSS

6.7AI Score

0.0005EPSS

2023-12-28 09:16 PM
7
github
github

ewen-lbh/ffcss Late-Unicode normalization vulnerability

Summary The function lookupPreprocess() is meant to apply some transformations to a string by disabling characters in the regex [-_ .]. However, due to the use of late Unicode normalization of type NFKD, it is possible to bypass that validation and re-introduce all the characters in the regex [-_.....

5.3CVSS

7.2AI Score

0.0005EPSS

2023-12-28 09:16 PM
4
packetstorm

7.4AI Score

0.0004EPSS

2023-12-13 12:00 AM
251
code423n4
code423n4

Proxy's logic contract relies on code in the constructor

Lines of code 122, 50, 25, 67, 98, 67, 22 Vulnerability details Logic contracts cannot rely on code in their constructors, because proxy contracts do not re-execute the logic contract's constructor - only its initializer. Move all code in the constructor to the initializer function. File:...

7.2AI Score

2023-12-12 12:00 AM
3
code423n4
code423n4

High risk in integrating Ocean with Curve TriCrypto pool on Arbitrum

Lines of code Vulnerability details Impact The Curve TriCrypto adapter contract enables swapping, adding liquidity, and removing liquidity for the USDT-WBTC-ETH pool on Arbitrum. However, this pool has been flagged for potential exploit risks. Curve Finance issued a warning: This pool might be...

7.1AI Score

2023-12-08 12:00 AM
8
openbugbounty
openbugbounty

berlin-partner.de Cross Site Scripting vulnerability OBB-3803356

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

6.2AI Score

2023-12-05 12:07 PM
3
code423n4
code423n4

Proxy's logic contract relies on code in the constructor

Lines of code 122, 50, 25, 67, 98, 67, 22 Vulnerability details Impact Logic contracts cannot rely on code in their constructors, because proxy contracts do not re-execute the logic contract's constructor - only its initializer. Move all code in the constructor to the initializer function. File:...

7.2AI Score

2023-11-29 12:00 AM
2
openbugbounty
openbugbounty

berlin-underground.com Improper Access Control vulnerability OBB-3794065

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

7AI Score

2023-11-26 04:51 AM
2
code423n4
code423n4

Price can be easily inflated/deflated by large depositors in the Market contract

Lines of code https://github.com/code-423n4/2023-11-canto/blob/335930cd53cf9a137504a57f1215be52c6d67cb3/1155tech-contracts/src/bonding_curve/LinearBondingCurve.sol#L21-L22 Vulnerability details Impact An attacker can manipulate/inflate market prices by donating/buying large amounts of tokens which....

7.1AI Score

2023-11-17 12:00 AM
2
mskb
mskb

Description of the security update for SharePoint Server Subscription Edition: November 14, 2023 (KB5002527)

Description of the security update for SharePoint Server Subscription Edition: November 14, 2023 (KB5002527) Summary This security update resolves a Microsoft SharePoint Server remote code execution vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and...

6.8CVSS

7.4AI Score

0.001EPSS

2023-11-14 08:00 AM
37
code423n4
code423n4

testing submission form - IGNORE

Lines of code Vulnerability details Impact Detailed description of the impact of this finding. Proof of Concept Provide direct links to all referenced code in GitHub. Add screenshots, logs, or any other relevant proof that illustrates the concept. Tools Used Recommended Mitigation Steps Assessed...

7.2AI Score

2023-11-02 12:00 AM
2
talosblog
talosblog

Arid Viper disguising mobile spyware as updates for non-malicious Android applications

Since April 2022, Cisco Talos has been tracking a malicious campaign operated by the espionage-motivated Arid Viper advanced persistent threat (APT) group targeting Arabic-speaking Android users. In this campaign, the actors leverage custom mobile malware, also known as Android Package files...

7AI Score

2023-10-31 11:00 AM
24
openbugbounty
openbugbounty

berlin-muenzberg.de Improper Access Control vulnerability OBB-3769336

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

6.9AI Score

2023-10-30 06:32 PM
4
Total number of security vulnerabilities1571