6

CVSS4.0

CVE-2024-24554 - Bludit - Insecure Token Generation

Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.

πŸ“… Published: June 24, 2024, 7:11 a.m. πŸ”„ Last Modified: Jan. 2, 2026, 8:20 p.m.

5.9

CVSS4.0

CVE-2024-24553 - Bludit uses SHA1 as Password Hashing Algorithm

Bludit uses the SHA-1 hashing algorithm to compute password hashes. Thus, attackers could determine cleartext passwords with brute-force attacks due to the inherent speed of SHA-1. In addition, the salt that is computed by Bludit is generated with a non-cryptographically secure function.

πŸ“… Published: June 24, 2024, 7:10 a.m. πŸ”„ Last Modified: Jan. 2, 2026, 8:35 p.m.

5.6

CVSS4.0

CVE-2024-24552 - Bludit is Vulnerable to Session Fixation

A session fixation vulnerability in Bludit allows an attacker to bypass the server's authentication if they can trick an administrator or any other user into authorizing a session ID of their choosing.

πŸ“… Published: June 24, 2024, 7:09 a.m. πŸ”„ Last Modified: Jan. 2, 2026, 8:33 p.m.

8.9

CVSS4.0

CVE-2024-24551 - Bludit - Remote Code Execution (RCE) through Image API

A security vulnerability has been identified in Bludit, allowing authenticated attackers to execute arbitrary code through the Image API. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.

πŸ“… Published: June 24, 2024, 7:08 a.m. πŸ”„ Last Modified: Jan. 2, 2026, 8:31 p.m.

8.9

CVSS4.0

CVE-2024-24550 - Bludit - Remote Code Execution (RCE) through File API

A security vulnerability has been identified in Bludit, allowing attackers with knowledge of the API token to upload arbitrary files through the File API which leads to arbitrary code execution on the server. This vulnerability arises from improper handling of file uploads, enabling malicious actor…

πŸ“… Published: June 24, 2024, 7:05 a.m. πŸ”„ Last Modified: Jan. 2, 2026, 8:19 p.m.

0.0

CVE-2024-4460 -

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“… Published: June 24, 2024, 6:58 a.m. πŸ”„ Last Modified: July 17, 2024, 11:15 a.m.

6.1

CVSS3.1

CVE-2024-4900 - SEOPress < 7.8 - Contributor+ Open Redirect

The SEOPress WordPress plugin before 7.8 does not validate and escape one of its Post settings, which could allow contributor and above role to perform Open redirect attacks against any user viewing a malicious post

πŸ“… Published: June 24, 2024, 6 a.m. πŸ”„ Last Modified: May 19, 2025, 9:04 p.m.

5.0

CVSS3.1

CVE-2024-4899 - SEOPress < 7.8 - Contributor+ Stored XSS

The SEOPress WordPress plugin before 7.8 does not sanitise and escape some of its Post settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks.

πŸ“… Published: June 24, 2024, 6 a.m. πŸ”„ Last Modified: May 19, 2025, 9:03 p.m.

6.3

CVSS3.1

CVE-2024-4499 - CSRF Vulnerability in parisneo/lollms XTTS Server

A Cross-Site Request Forgery (CSRF) vulnerability exists in the XTTS server of parisneo/lollms version 9.6 due to a lax CORS policy. The vulnerability allows attackers to perform unauthorized actions by tricking a user into visiting a malicious webpage, which can then trigger arbitrary LoLLMS-XTTS …

πŸ“… Published: June 24, 2024, 3:06 a.m. πŸ”„ Last Modified: Nov. 21, 2024, 9:42 a.m.

5.3

CVSS4.0

CVE-2024-6280 - SourceCodester Simple Online Bidding System unrestricted upload

A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/ajax.php?action=save_settings. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack r…

πŸ“… Published: June 24, 2024, 3 a.m. πŸ”„ Last Modified: Nov. 21, 2024, 9:49 a.m.
Total resulsts: 349182
Page 9349 of 34,919
Β« previous page Β» next page
Filters