8.7

CVSS4.0

CVE-2023-22650 - Rancher does not automatically clean up a user deleted or disabled from the configured Authenticati…

A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s…

📅 Published: Oct. 16, 2024, 8:20 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.5

CVSS3.1

CVE-2024-45219 - Apache CloudStack: Uploaded and registered templates and volumes can be used to abuse KVM-based inf…

Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack 4.0.0 through 4.18.2.3 …

📅 Published: Oct. 16, 2024, 7:55 a.m. 🔄 Last Modified: July 1, 2025, 8:28 p.m.

5.7

CVSS3.1

CVE-2024-45461 - Apache CloudStack Quota plugin: Access checks not enforced in Quota

The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access…

📅 Published: Oct. 16, 2024, 7:54 a.m. 🔄 Last Modified: Feb. 21, 2025, 4:53 p.m.

6.3

CVSS3.1

CVE-2024-45462 - Apache CloudStack: Incomplete session invalidation on web interface logout

The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to gain access to resources owned by the logged out us…

📅 Published: Oct. 16, 2024, 7:53 a.m. 🔄 Last Modified: Nov. 21, 2024, 9:37 a.m.

8

CVSS3.1

CVE-2024-45693 - Apache CloudStack: Request origin validation bypass makes account takeover possible

Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticated users and may lead to account takeover, disrup…

📅 Published: Oct. 16, 2024, 7:52 a.m. 🔄 Last Modified: Nov. 21, 2024, 9:37 a.m.

8.1

CVSS3.1

CVE-2024-45217 - Apache Solr: ConfigSets created during a backup restore command are trusted implicitly

Insecure Default Initialization of Resource vulnerability in Apache Solr. New ConfigSets that are created via a Restore command, which copy a configSet from the backup and give it a new name, are created without setting the "trusted" metadata. ConfigSets that do not contain the flag are trusted im…

📅 Published: Oct. 16, 2024, 7:51 a.m. 🔄 Last Modified: July 1, 2025, 8:28 p.m.

9.8

CVSS3.1

CVE-2024-45216 - Apache Solr: Authentication bypass possible using a fake URL Path ending

Improper Authentication vulnerability in Apache Solr. Solr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass. A fake ending at the end of any Solr API URL path, will allow requests to skip Authenticati…

📅 Published: Oct. 16, 2024, 7:50 a.m. 🔄 Last Modified: July 1, 2025, 8:28 p.m.

8.4

CVSS4.0

CVE-2023-22649 - Rancher 'Audit Log' leaks sensitive information

A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have …

📅 Published: Oct. 16, 2024, 7:46 a.m. 🔄 Last Modified: Oct. 30, 2024, 9:08 p.m.

8.8

CVSS3.1

CVE-2020-36842 - Migration, Backup, Staging – WPvivid <= 0.9.35 - Authenticated (Subscriber+) Arbitrary File Upload

The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the wpvivid_upload_import_files and wpvivid_upload_files AJAX actions that allows low-level authenticated attackers to upload zip files that can be subsequently…

📅 Published: Oct. 16, 2024, 7:31 a.m. 🔄 Last Modified: April 8, 2026, 5:28 p.m.

6.1

CVSS3.1

CVE-2023-7295 - Video Grid <= 1.21 - Reflected Cross-Site Scripting

The Video Grid plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts i…

📅 Published: Oct. 16, 2024, 7:31 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 349182
Page 8269 of 34,919
« previous page » next page
Filters