7.1

CVSS4.0

CVE-2024-55633 - Apache Superset: SQLLab Improper readonly query validation allows unauthorized write access

Improper Authorization vulnerability in Apache Superset. On Postgres analytic databases an attacker with SQLLab access can craft a specially designed SQL DML statement that is Incorrectly identified as a read-only query, enabling its execution. Non postgres analytics database connections and postgr…

📅 Published: Dec. 12, 2024, 2:36 p.m. 🔄 Last Modified: Feb. 12, 2025, 10:15 a.m.

9.2

CVSS4.0

CVE-2024-21575 -

ComfyUI-Impact-Pack is vulnerable to Path Traversal. The issue stems from missing validation of the `image.filename` field in a POST request sent to the `/upload/temp` endpoint added by the extension to the server. This results in writing arbitrary files to the file system which may, under some con…

📅 Published: Dec. 12, 2024, 2:14 p.m. 🔄 Last Modified: Dec. 12, 2024, 3:15 p.m.

8.4

CVSS3.1

CVE-2024-28143 - Insecure Password Change Function

The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g.…

📅 Published: Dec. 12, 2024, 1:52 p.m. 🔄 Last Modified: Nov. 3, 2025, 10:16 p.m.

8.4

CVSS3.1

CVE-2024-28146 - Hardcoded credentials

The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device.

📅 Published: Dec. 12, 2024, 1:49 p.m. 🔄 Last Modified: Nov. 3, 2025, 10:16 p.m.

4.4

CVSS3.1

CVE-2024-50584 - SQL Injection

An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the …

📅 Published: Dec. 12, 2024, 1:39 p.m. 🔄 Last Modified: Nov. 3, 2025, 11:17 p.m.

5.9

CVSS3.1

CVE-2024-28145 - Unauthenticated SQL Injection

An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION…

📅 Published: Dec. 12, 2024, 1:36 p.m. 🔄 Last Modified: Nov. 3, 2025, 10:16 p.m.

5.5

CVSS3.1

CVE-2024-28144 - Broken Access Control

An attacker who can spoof the IP address and the User-Agent of a logged-in user can takeover the session because of flaws in the self-developed session management. If two users access the web interface from the same IP they are logged in as the other user.

📅 Published: Dec. 12, 2024, 1:24 p.m. 🔄 Last Modified: Nov. 3, 2025, 10:16 p.m.

4.7

CVSS3.1

CVE-2024-36494 - Reflected Cross Site Scripting

Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the …

📅 Published: Dec. 12, 2024, 12:51 p.m. 🔄 Last Modified: Nov. 3, 2025, 10:16 p.m.

4.7

CVSS3.1

CVE-2024-36498 - Stored cross site scripting

Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "Edit Disclaimer Text" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function whi…

📅 Published: Dec. 12, 2024, 12:46 p.m. 🔄 Last Modified: Nov. 3, 2025, 10:16 p.m.

4.4

CVSS3.1

CVE-2024-12271 - 360 Javascript Viewer <= 1.7.29 - Authenticated (Administrator+) Stored Cross-Site Scripting

The 360 Javascript Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ref’ parameter in all versions up to, and including, 1.7.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level a…

📅 Published: Dec. 12, 2024, 12:42 p.m. 🔄 Last Modified: April 8, 2026, 4:36 p.m.
Total resulsts: 343920
Page 6972 of 34,392
« previous page » next page
Filters