Click to open the Alert Filter

 
Year Month
Severity
Categories
Search by Alert Name
Page(s) : 1 ... 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 [1586] 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 ... Result(s) : 329663

Alerts Feed Alerts

DATE NAME CATEGORIES DETAIL
N/A 2024-12-06 CVE-2024-54143 cve openwrt/asu is an image on demand server for OpenWrt based distributions. The request hashing mechanism truncates SHA-256 hashes to only 12 characters. This significantly reduce...
N/A 2024-12-06 CVE-2024-54749 cve Ubiquiti U7-Pro 7.0.35 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. NOTE: this is disputed by the Suppl...
6.1 2024-12-06 CVE-2024-55268 cve A Reflected Cross Site Scripting (XSS) vulnerability was found in /covidtms/registered-user-testing.php in PHPGurukul COVID 19 Testing Management System 1.0 which allows remote ...
7.8 2024-12-06 CVE-2024-11220 cve A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code...
7.5 2024-12-06 CVE-2024-42494 cve Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a a feature that could enable sub accounts or attackers to view and exfiltrate sensitive information fr...
5.3 2024-12-06 CVE-2024-47043 cve Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could enable an attacker to correlate a device serial number and the user's phone number and part of the em...
9.8 2024-12-06 CVE-2024-47547 cve Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a weak mechanism for its users to change their passwords which leaves authentication vulnerable to brut...
4.8 2024-12-06 CVE-2024-48703 cve PhpGurukul Medical Card Generation System v1.0 is vulnerable to Cross Site Scripting (XSS) in /admin/search-medicalcard.php via the searchdata parameter.
N/A 2024-12-06 CVE-2024-48871 cve The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check i...
7.5 2024-12-06 CVE-2024-51727 cve Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a feature that could enable attackers to invalidate a legitimate user's session and cause a denial...
N/A 2024-12-06 CVE-2024-52320 cve The affected product is vulnerable to a command injection. An unauthenticated attacker could send commands through a malicious HTTP request which could result in remote code exe...
N/A 2024-12-06 CVE-2024-52558 cve The affected product is vulnerable to an integer underflow. An unauthenticated attacker could send a malformed HTTP request, which could allow the attacker to crash the program.
6.5 2024-12-06 CVE-2024-11729 cve The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'service_list[0][service_id]' parameter of the get_...
6.5 2024-12-06 CVE-2024-11730 cve The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'sort[]' parameter of the static_data_list AJAX act...
N/A 2024-12-06 CVE-2024-53907 cve An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential de...
N/A 2024-12-06 CVE-2024-53908 cve An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle data...
N/A 2024-12-06 CVE-2024-10771 cve Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Servi...
N/A 2024-12-06 CVE-2024-10772 cve Since the firmware update is not validated, an attacker can install modified firmware on the device. This has a high impact on the availabilty, integrity and confidentiality up ...
N/A 2024-12-06 CVE-2024-10773 cve The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user l...
N/A 2024-12-06 CVE-2024-10774 cve Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authentication.
Page(s) : 1 ... 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 [1586] 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 ... Result(s) : 329663