Search Results (23450 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-44808 1 Vypor 1 Attack Api System 2024-09-05 9.8 Critical
An issue in Vypor Attack API System v.1.0 allows a remote attacker to execute arbitrary code via the user GET parameter.
CVE-2024-23362 1 Qualcomm 205 9205 Lte Modem Firmware, Aqt1000 Firmware, Ar8031 Firmware and 202 more 2024-09-05 7.1 High
Cryptographic issue while parsing RSA keys in COBR format.
CVE-2024-42435 1 Zoom 6 Meeting Software Development Kit, Rooms, Rooms Controller and 3 more 2024-09-04 4.9 Medium
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
CVE-2024-42434 1 Zoom 6 Meeting Software Development Kit, Rooms, Rooms Controller and 3 more 2024-09-04 4.9 Medium
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
CVE-2024-39824 1 Zoom 6 Meeting Software Development Kit, Rooms, Rooms Controller and 3 more 2024-09-04 4.9 Medium
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
CVE-2024-39823 1 Zoom 6 Meeting Software Development Kit, Rooms, Rooms Controller and 3 more 2024-09-04 4.9 Medium
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
CVE-2024-39822 1 Zoom 5 Meeting Software Development Kit, Rooms, Rooms Controller and 2 more 2024-09-04 6.5 Medium
Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access.
CVE-2024-44820 1 Zzcms 1 Zzcms 2024-09-04 7.5 High
A sensitive information disclosure vulnerability exists in ZZCMS v.2023 and before within the eginfo.php file located at /3/E_bak5.1/upload/. When accessed with the query parameter phome=ShowPHPInfo, the application executes the phpinfo() function, which exposes detailed information about the PHP environment, including server configuration, loaded modules, and environment variables.
CVE-2024-44809 1 Recantha 1 Pi Camera Project 2024-09-04 9.8 Critical
A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the "position" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks.
CVE-2024-1543 1 Wolfssl 2 Wolfcrypt, Wolfssl 2024-09-04 4.1 Medium
The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500
CVE-2024-41698 1 Priority-software 1 Priority 2024-09-03 4.3 Medium
Priority – CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-43803 1 Redhat 1 Openshift 2024-09-03 4.9 Medium
The Bare Metal Operator (BMO) implements a Kubernetes API for managing bare metal hosts in Metal3. The `BareMetalHost` (BMH) CRD allows the `userData`, `metaData`, and `networkData` for the provisioned host to be specified as links to Kubernetes Secrets. There are fields for both the `Name` and `Namespace` of the Secret, meaning that versions of the baremetal-operator prior to 0.8.0, 0.6.2, and 0.5.2 will read a `Secret` from any namespace. A user with access to create or edit a `BareMetalHost` can thus exfiltrate a `Secret` from another namespace by using it as e.g. the `userData` for provisioning some host (note that this need not be a real host, it could be a VM somewhere). BMO will only read a key with the name `value` (or `userData`, `metaData`, or `networkData`), so that limits the exposure somewhat. `value` is probably a pretty common key though. Secrets used by _other_ `BareMetalHost`s in different namespaces are always vulnerable. It is probably relatively unusual for anyone other than cluster administrators to have RBAC access to create/edit a `BareMetalHost`. This vulnerability is only meaningful, if the cluster has users other than administrators and users' privileges are limited to their respective namespaces. The patch prevents BMO from accepting links to Secrets from other namespaces as BMH input. Any BMH configuration is only read from the same namespace only. The problem is patched in BMO releases v0.7.0, v0.6.2 and v0.5.2 and users should upgrade to those versions. Prior upgrading, duplicate the BMC Secrets to the namespace where the corresponding BMH is. After upgrade, remove the old Secrets. As a workaround, an operator can configure BMO RBAC to be namespace scoped for Secrets, instead of cluster scoped, to prevent BMO from accessing Secrets from other namespaces.
CVE-2024-41700 1 Barix 2 Sip Client Firmware, Sip Client Web Management Interface Ui 2024-09-03 7.5 High
Barix – CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-7925 1 Zzcms 1 Zzcms 2024-09-03 4.3 Medium
A vulnerability was found in ZZCMS 2023. It has been rated as problematic. This issue affects some unknown processing of the file 3/E_bak5.1/upload/eginfo.php. The manipulation of the argument phome with the input ShowPHPInfo leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-6586 1 Lightdash 1 Lightdash 2024-09-03 7.3 High
Lightdash version 0.1024.6 allows users with the necessary permissions, such as Administrator or Editor, to create and share dashboards. A dashboard that contains HTML elements which point to a threat actor controlled source can trigger an SSRF request when exported, via a POST request to /api/v1/dashboards//export. The forged request contains the value of the exporting user’s session token. A threat actor could obtain the session token of any user who exports the dashboard. The obtained session token can be used to perform actions as the victim on the application, resulting in session takeover.
CVE-2024-24973 1 Intel 2 Distribution For Gdb, Oneapi Base Toolkit 2024-08-31 2.2 Low
Improper input validation for some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2024-42337 1 Cyberark 1 Identity 2024-08-30 4.3 Medium
CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-42338 1 Cyberark 1 Identity 2024-08-30 4.3 Medium
CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-42339 1 Cyberark 1 Identity 2024-08-30 4.3 Medium
CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-39751 1 Ibm 1 Infosphere Information Server 2024-08-29 4.3 Medium
IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 297429