5.3

CVSS4.0

CVE-2024-10348 - SourceCodester Best House Rental Management System Manage Tenant Details index.php cross site scrip…

A vulnerability was found in SourceCodester Best House Rental Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /index.php?page=tenants of the component Manage Tenant Details. The manipulation of the argument Last Name/First Name/Middle Name lead…

📅 Published: Oct. 24, 2024, 10 p.m. 🔄 Last Modified: Oct. 30, 2024, 1:03 p.m.

4.6

CVSS3.1

CVE-2024-49762 - Pterodactyl Panel has plain-text logging of user passwords when two-factor authentication is disabl…

Pterodactyl is a free, open-source game server management panel. When a user disables two-factor authentication via the Panel, a `DELETE` request with their current password in a query parameter will be sent. While query parameters are encrypted when using TLS, many webservers (including ones offi…

📅 Published: Oct. 24, 2024, 9:39 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

7.1

CVSS3.1

CVE-2024-49760 - OpenRefine has a path traversal in LoadLanguageCommand

OpenRefine is a free, open source tool for working with messy data. The load-language command expects a `lang` parameter from which it constructs the path of the localization file to load, of the form `translations-$LANG.json`. But when doing so in versions prior to 3.8.3, it does not check that th…

📅 Published: Oct. 24, 2024, 9:35 p.m. 🔄 Last Modified: Nov. 6, 2024, 3:01 p.m.

7.5

CVSS3.1

CVE-2024-49359 - ZimaOS vulnerable to Directory Listing via Parameter Manipulation

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http://<Zima_Server_IP:PORT>/v2_1/file` in ZimaOS is vulnerable to a directory traversal attack, allowing authenticated users to list the content…

📅 Published: Oct. 24, 2024, 9:33 p.m. 🔄 Last Modified: Sept. 22, 2025, 2:21 p.m.

5.3

CVSS3.1

CVE-2024-49358 - ZimaOS vulnerable to Username Enumeration via API Responses

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http://<Server-IP>/v1/users/login` in ZimaOS returns distinct responses based on whether a username exists or the password is incorrect. This beh…

📅 Published: Oct. 24, 2024, 9:25 p.m. 🔄 Last Modified: Sept. 22, 2025, 2:21 p.m.

7.5

CVSS3.1

CVE-2024-49357 - ZimaOS (Installed Applications and System Information) has Unauthorized Sensitive Data Leak

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoints in ZimaOS, such as `http://<Server-IP>/v1/users/image?path=/var/lib/casaos/1/app_order.json` and `http://<Server-IP>/v1/users/image?path=/var/lib…

📅 Published: Oct. 24, 2024, 9:21 p.m. 🔄 Last Modified: Sept. 22, 2025, 2:21 p.m.

5.3

CVSS3.1

CVE-2024-48932 - ZimaOS Unauthenticated API Discloses Usernames

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In versions below 1.5.0, the API endpoint `http://<Server-ip>/v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability …

📅 Published: Oct. 24, 2024, 9 p.m. 🔄 Last Modified: Nov. 5, 2025, 10:15 p.m.

7.5

CVSS3.1

CVE-2024-48931 - ZimaOS Arbitrary File Read via Parameter Manipulation

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http://<Zima_Server_IP:PORT>/v3/file?token=<token>&files=<file_path>` is vulnerable to arbitrary file reading due to improper input valida…

📅 Published: Oct. 24, 2024, 8:49 p.m. 🔄 Last Modified: Nov. 6, 2024, 3:46 p.m.

9.1

CVSS3.1

CVE-2024-47883 - Butterfly has path/URL confusion in resource handling leading to multiple weaknesses

The OpenRefine fork of the MIT Simile Butterfly server is a modular web application framework. The Butterfly framework uses the `java.net.URL` class to refer to (what are expected to be) local resource files, like images or templates. This works: "opening a connection" to these URLs opens the local…

📅 Published: Oct. 24, 2024, 8:39 p.m. 🔄 Last Modified: Oct. 29, 2024, 3:38 p.m.

5.9

CVSS3.1

CVE-2024-47882 - OpenRefine's error page lacks escaping, leading to potential Cross-site Scripting on import of mali…

OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the built-in "Something went wrong!" error page includes the exception message and exception traceback without escaping HTML tags, enabling injection into the page if an attacker can reliably produce an erro…

📅 Published: Oct. 24, 2024, 8:35 p.m. 🔄 Last Modified: Oct. 28, 2024, 2:26 p.m.
Total resulsts: 349182
Page 8152 of 34,919
« previous page » next page
Filters