9.9

CVSS3.1

CVE-2023-32191 - rke's credentials are stored in the RKE1 Cluster state ConfigMap

When RKE provisions a cluster, it stores the cluster state in a configmap called `full-cluster-state` inside the `kube-system` namespace of the cluster itself. The information available in there allows non-admin users to escalate to admin.

📅 Published: Oct. 16, 2024, 12:17 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.5

CVSS4.0

CVE-2023-32190 - mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

📅 Published: Oct. 16, 2024, 12:03 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

5.3

CVSS4.0

CVE-2024-10022 - code-projects Pharmacy Management System manage_supplier.php sql injection

A vulnerability classified as critical has been found in code-projects Pharmacy Management System 1.0. This affects an unknown part of the file /php/manage_supplier.php?action=search. The manipulation of the argument text leads to sql injection. It is possible to initiate the attack remotely. The e…

📅 Published: Oct. 16, 2024, noon 🔄 Last Modified: Oct. 21, 2024, 1:14 p.m.

5.3

CVSS4.0

CVE-2024-10021 - code-projects Pharmacy Management System manage_purchase.php sql injection

A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /php/manage_purchase.php?action=search&tag=VOUCHER_NUMBER. The manipulation of the argument text leads to sql injection. The att…

📅 Published: Oct. 16, 2024, noon 🔄 Last Modified: Oct. 21, 2024, 1:13 p.m.

7.7

CVSS3.1

CVE-2024-8040 - Authorization Bypass Through User-Controlled Key vulnerability affecting 3DSwym in 3DSwymer on Rele…

An authorization bypass through user-controlled key vulnerability affecting 3DSwym in 3DSwymer on Release 3DEXPERIENCE R2024x allows an authenticated attacker to access some unauthorized data.

📅 Published: Oct. 16, 2024, 11:28 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.7

CVSS3.1

CVE-2024-6380 - Reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovato…

A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.

📅 Published: Oct. 16, 2024, 11:28 a.m. 🔄 Last Modified: Oct. 22, 2025, 4:30 p.m.

6.4

CVSS3.1

CVE-2024-8921 - Zita Elementor Site Library <= 1.6.3 - Authenticated (Author+) Stored Cross-Site Scripting via SVG …

The Zita Elementor Site Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access…

📅 Published: Oct. 16, 2024, 11:03 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.4

CVSS3.1

CVE-2024-9444 - ElementsReady Addons for Elementor <= 6.4.3 - Authenticated (Author+) Stored Cross-Site Scripting v…

The ElementsReady Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level…

📅 Published: Oct. 16, 2024, 9:32 a.m. 🔄 Last Modified: April 8, 2026, 5:19 p.m.

5.9

CVSS4.0

CVE-2024-9858 - Insecure user permissions in Google Cloud Migrate to Containers for Windows

There exists an insecure default user permission in Google Cloud Migrate to containers from version 1.1.0 to 1.2.2 Windows installs. A local "m2cuser" was greated with administrator privileges. This posed a security risk if the "analyze" or "generate" commands were interrupted or skipping the actio…

📅 Published: Oct. 16, 2024, 8:43 a.m. 🔄 Last Modified: July 30, 2025, 7:32 p.m.

9.4

CVSS4.0

CVE-2023-32188 - JWT token compromise can allow malicious actions including Remote Code Execution (RCE)

A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.

📅 Published: Oct. 16, 2024, 8:25 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 349182
Page 8268 of 34,919
« previous page » next page
Filters