Search Results (348705 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-22714 1 Supsystic 1 Coming Soon 2025-01-09 4.3 Medium
Cross-Site Request Forgery (CSRF) vulnerability in Supsystic Coming Soon by Supsystic plugin <= 1.7.10 versions.
CVE-2022-47142 1 Mediamatic 1 Media Library Folders 2025-01-09 4.3 Medium
Cross-Site Request Forgery (CSRF) vulnerability in Plugincraft Mediamatic – Media Library Folders plugin <= 2.8.1 versions.
CVE-2022-47609 1 Nicearma 1 Dnui-delete-not-used-image 2025-01-09 6.3 Medium
Cross-Site Request Forgery (CSRF) vulnerability in Nicearma DNUI plugin <= 2.8.1 versions.
CVE-2022-47611 1 Hover Image Project 1 Hover Image 2025-01-09 4.3 Medium
Cross-Site Request Forgery (CSRF) vulnerability in Julian Weinert // cs&m Hover Image plugin <= 1.4.1 versions.
CVE-2022-47183 1 Stylist Project 1 Stylist 2025-01-09 5.4 Medium
Cross-Site Request Forgery (CSRF) vulnerability in StylistWP Extra Block Design, Style, CSS for ANY Gutenberg Blocks plugin <= 0.2.6 versions.
CVE-2025-0347 2025-01-09 7.3 High
A vulnerability was found in code-projects Admission Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php of the component Login. The manipulation of the argument u_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2023-6451 1 Alayacare 1 Procura 2025-01-09 8.6 High
Publicly known cryptographic machine key in AlayaCare's Procura Portal before 9.0.1.2 allows attackers to forge their own authentication cookies and bypass the application's authentication mechanisms.
CVE-2024-29893 2 Argoproj, Redhat 2 Argo Cd, Openshift Gitops 2025-01-09 6.5 Medium
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, it's possible to crash the repo server component through an out of memory error by pointing it to a malicious Helm registry. The loadRepoIndex() function in the ArgoCD's helm package, does not limit the size nor time while fetching the data. It fetches it and creates a byte slice from the retrieved data in one go. If the registry is implemented to push data continuously, the repo server will keep allocating memory until it runs out of it. A patch for this vulnerability has been released in v2.10.3, v2.9.8, and v2.8.12.
CVE-2024-26147 2 Helm, Redhat 5 Helm, Acm, Advanced Cluster Security and 2 more 2025-01-09 7.5 High
Helm is a package manager for Charts for Kubernetes. Versions prior to 3.14.2 contain an uninitialized variable vulnerability when Helm parses index and plugin yaml files missing expected content. When either an `index.yaml` file or a plugins `plugin.yaml` file were missing all metadata a panic would occur in Helm. In the Helm SDK, this is found when using the `LoadIndexFile` or `DownloadIndexFile` functions in the `repo` package or the `LoadDir` function in the `plugin` package. For the Helm client this impacts functions around adding a repository and all Helm functions if a malicious plugin is added as Helm inspects all known plugins on each invocation. This issue has been resolved in Helm v3.14.2. If a malicious plugin has been added which is causing all Helm client commands to panic, the malicious plugin can be manually removed from the filesystem. If using Helm SDK versions prior to 3.14.2, calls to affected functions can use `recover` to catch the panic.
CVE-2022-46308 1 Sguda 2 U-lock, U-lock Firmware 2025-01-09 8.8 High
SGUDA U-Lock central lock control service’s user management function has incorrect authorization. A remote attacker with general user privilege can exploit this vulnerability to call privileged APIs to access, modify and delete user information.
CVE-2022-46307 1 Sguda 2 U-lock, U-lock Firmware 2025-01-09 8.8 High
SGUDA U-Lock central lock control service’s lock management function has incorrect authorization. A remote attacker with general privilege can exploit this vulnerability to call privileged APIs to acquire information, manipulate or disrupt the functionality of arbitrary electronic locks.
CVE-2024-25123 1 Open-mss 1 Mission Support System 2025-01-09 7.3 High
MSS (Mission Support System) is an open source package designed for planning atmospheric research flights. In file: `index.py`, there is a method that is vulnerable to path manipulation attack. By modifying file paths, an attacker can acquire sensitive information from different resources. The `filename` variable is joined with other variables to form a file path in `_file`. However, `filename` is a route parameter that can capture path type values i.e. values including slashes (\). So it is possible for an attacker to manipulate the file being read by assigning a value containing ../ to `filename` and so the attacker may be able to gain access to other files on the host filesystem. This issue has been addressed in MSS version 8.3.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-25620 2 Helm, Redhat 4 Helm, Acm, Openshift and 1 more 2025-01-09 6.4 Medium
Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. When either the Helm client or SDK is used to save a chart whose name within the `Chart.yaml` file includes a relative path change, the chart would be saved outside its expected directory based on the changes in the relative path. The validation and linting did not detect the path changes in the name. This issue has been resolved in Helm v3.14.1. Users unable to upgrade should check all charts used by Helm for path changes in their name as found in the `Chart.yaml` file. This includes dependencies.
CVE-2024-11096 1 Code-projects 1 Task Manager 2025-01-09 6.3 Medium
A vulnerability, which was classified as critical, was found in code-projects Task Manager 1.0. This affects an unknown part of the file /newProject.php. The manipulation of the argument projectName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-11077 2 Anisha, Code-projects 2 Job Recruitment, Job Recruitment 2025-01-09 7.3 High
A vulnerability, which was classified as critical, was found in code-projects Job Recruitment 1.0. Affected is an unknown function of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-11076 1 Anisha 1 Job Recruitment 2025-01-09 6.3 Medium
A vulnerability, which was classified as critical, has been found in code-projects Job Recruitment 1.0. This issue affects some unknown processing of the file /activation.php. The manipulation of the argument e_hash leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2023-25912 1 Danfoss 2 Ak-em100, Ak-em100 Firmware 2025-01-09 5.3 Medium
The webreport generation feature in the Danfoss AK-EM100 allows an unauthorized actor to generate a web report that discloses sensitive information such as the internal IP address, usernames and internal device values.
CVE-2023-22584 1 Danfoss 2 Ak-em100, Ak-em100 Firmware 2025-01-09 7.5 High
The Danfoss AK-EM100 stores login credentials in cleartext.
CVE-2023-22585 1 Danfoss 2 Ak-em100, Ak-em100 Firmware 2025-01-09 9 Critical
The Danfoss AK-EM100 web applications allow for Reflected Cross-Site Scripting in the title parameter.
CVE-2023-22583 1 Danfoss 2 Ak-em100, Ak-em100 Firmware 2025-01-09 10 Critical
The Danfoss AK-EM100 web forms allow for SQL injection in the login forms.