๐จ CVE-2024-37323
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37324
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37326
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37327
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37328
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37329
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37330
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37331
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37332
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37333
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2024-37336
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
๐@cveNotify
๐จ CVE-2023-51146
Buffer Overflow vulnerability in TRENDnet AC1200 TEW-821DAP with firmware version 3.00b06 allows an attacker to execute arbitrary code via the adm_add_user action.
๐@cveNotify
Buffer Overflow vulnerability in TRENDnet AC1200 TEW-821DAP with firmware version 3.00b06 allows an attacker to execute arbitrary code via the adm_add_user action.
๐@cveNotify
GitHub
advisories/cve/trendnet/cve-2023-51146.md at main ยท SpikeReply/advisories
Advisories from Spike Reply Cybersecurity team. Contribute to SpikeReply/advisories development by creating an account on GitHub.
๐จ CVE-2024-29749
In tmu_set_tr_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
๐@cveNotify
In tmu_set_tr_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
๐@cveNotify
๐จ CVE-2024-31651
A cross-site scripting (XSS) in Cosmetics and Beauty Product Online Store v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the First Name parameter.
๐@cveNotify
A cross-site scripting (XSS) in Cosmetics and Beauty Product Online Store v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the First Name parameter.
๐@cveNotify
GitHub
CVE/CVE-2024-31651.md at main ยท Mohitkumar0786/CVE
Contribute to Mohitkumar0786/CVE development by creating an account on GitHub.
๐จ CVE-2023-48643
Shrubbery tac_plus 2.x, 3.x. and 4.x through F4.0.4.28 allows unauthenticated Remote Command Execution. The product allows users to configure authorization checks as shell commands through the tac_plus.cfg configuration file. These are executed when a client sends an authorization request with a username that has pre-authorization directives configured. However, it is possible to inject additional commands into these checks because strings from TACACS+ packets are used as command-line arguments. If the installation lacks a a pre-shared secret (there is no pre-shared secret by default), then the injection can be triggered without authentication. (The attacker needs to know a username configured to use a pre-authorization command.) NOTE: this is related to CVE-2023-45239 but the issue is in the original Shrubbery product, not Meta's fork.
๐@cveNotify
Shrubbery tac_plus 2.x, 3.x. and 4.x through F4.0.4.28 allows unauthenticated Remote Command Execution. The product allows users to configure authorization checks as shell commands through the tac_plus.cfg configuration file. These are executed when a client sends an authorization request with a username that has pre-authorization directives configured. However, it is possible to inject additional commands into these checks because strings from TACACS+ packets are used as command-line arguments. If the installation lacks a a pre-shared secret (there is no pre-shared secret by default), then the injection can be triggered without authentication. (The attacker needs to know a username configured to use a pre-authorization command.) NOTE: this is related to CVE-2023-45239 but the issue is in the original Shrubbery product, not Meta's fork.
๐@cveNotify
GitHub
GitHub - takeshixx/tac_plus-pre-auth-rce: tac_plus Pre-Auth Remote Command Execution Vulnerability (CVE-2023-45239 & CVE-2023-48643)
tac_plus Pre-Auth Remote Command Execution Vulnerability (CVE-2023-45239 & CVE-2023-48643) - takeshixx/tac_plus-pre-auth-rce
๐จ CVE-2024-36080
Westermo EDW-100 devices through 2024-05-03 have a hidden root user account with a hardcoded password that cannot be changed. NOTE: this is a serial-to-Ethernet converter that should not be placed at the edge of the network.
๐@cveNotify
Westermo EDW-100 devices through 2024-05-03 have a hidden root user account with a hardcoded password that cannot be changed. NOTE: this is a serial-to-Ethernet converter that should not be placed at the edge of the network.
๐@cveNotify
๐จ CVE-2024-33808
A SQL injection vulnerability in /model/get_timetable.php in campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the id parameter.
๐@cveNotify
A SQL injection vulnerability in /model/get_timetable.php in campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the id parameter.
๐@cveNotify
GitHub
cve_hub/Complete Web-Based School Management System/Complete Web-Based School Management System - vuln 20.pdf at main ยท E1CHO/cve_hub
Contribute to E1CHO/cve_hub development by creating an account on GitHub.
๐จ CVE-2024-35324
Douchat 4.0.5 suffers from an arbitrary file upload vulnerability via Public/Plugins/webuploader/server/preview.php.
๐@cveNotify
Douchat 4.0.5 suffers from an arbitrary file upload vulnerability via Public/Plugins/webuploader/server/preview.php.
๐@cveNotify
๐จ CVE-2024-35492
Cesanta Mongoose commit b316989 was discovered to contain a NULL pointer dereference via the scpy function at src/fmt.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MQTT packet.
๐@cveNotify
Cesanta Mongoose commit b316989 was discovered to contain a NULL pointer dereference via the scpy function at src/fmt.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MQTT packet.
๐@cveNotify
๐จ CVE-2024-35354
A vulnerability has been discovered in Diรฑo Physics School Assistant version 2.3. The vulnerability impacts an unidentified code within the file /classes/Master.php?f=save_category. Manipulating the argument id can result in SQL injection.
๐@cveNotify
A vulnerability has been discovered in Diรฑo Physics School Assistant version 2.3. The vulnerability impacts an unidentified code within the file /classes/Master.php?f=save_category. Manipulating the argument id can result in SQL injection.
๐@cveNotify