8.1

CVSS3.1

CVE-2024-56358 - Cross-site Scripting vulnerability through svg attachment previews in grist-core

grist-core is a spreadsheet hosting server. A user visiting a malicious document and previewing an attachment could have their account compromised, because JavaScript in an SVG file would be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advi…

📅 Published: Dec. 20, 2024, 8:24 p.m. 🔄 Last Modified: March 12, 2025, 5:33 p.m.

8.1

CVSS3.1

CVE-2024-56357 - Cross-site Scripting vulnerability through custom widget URLs and form redirect URLs in grist-core

grist-core is a spreadsheet hosting server. A user visiting a malicious document or submitting a malicious form could have their account compromised, because it was possible to use the `javascript:` scheme with custom widget URLs and form redirect URLs. This issue has been patched in version 1.3.1.…

📅 Published: Dec. 20, 2024, 8:24 p.m. 🔄 Last Modified: March 12, 2025, 5:36 p.m.

5.9

CVSS4.0

CVE-2024-40875 - Cross-site scripting vulnerability in the Secure Access administrative console prior to 13.52

There is a cross-site scripting vulnerability in the management console of Absolute Secure Access prior to version 13.52. Attackers with system administrator permissions can interfere with another system administrator’s use of the management console when the second administrator logs in. Attack com…

📅 Published: Dec. 20, 2024, 8:17 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

7.6

CVSS3.1

CVE-2024-56335 - Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vau…

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. In affected versions an attacker is capable of updating or deleting groups from an organization given a few conditions: 1. The attacker has a user account in the server. 2. The attacker's accou…

📅 Published: Dec. 20, 2024, 8:15 p.m. 🔄 Last Modified: Aug. 19, 2025, 1:46 p.m.

7.8

CVSS3.1

CVE-2024-56334 - Command injection vulnerability in getWindowsIEEE8021x (SSID) function in systeminformation

systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the `getWindowsIEEE8021x` function. This means that malicious content in the SSID can be executed as OS commands. This vulnerab…

📅 Published: Dec. 20, 2024, 8:10 p.m. 🔄 Last Modified: Dec. 24, 2024, 5:15 p.m.

9.3

CVSS4.0

CVE-2024-56330 - Session VNC may be accessed by other sessions on the same host in stardust

Stardust is a platform for streaming isolated desktop containers. With this exploit, inter container communication (ICC) is not disabled. This would allow users within a container to access another containers agent, therefore compromising access.The problem has been patched in any Stardust build pa…

📅 Published: Dec. 20, 2024, 8:01 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.9

CVSS4.0

CVE-2024-12842 - Emlog Pro user.php cross site scripting

A vulnerability was found in Emlog Pro up to 2.4.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/user.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed …

📅 Published: Dec. 20, 2024, 8 p.m. 🔄 Last Modified: June 5, 2025, 7:43 p.m.

8.9

CVSS4.0

CVE-2024-56329 - Account Takeover Vulnerability in Social Account Linking in joelbutcher/socialstream

Socialstream is a third-party package for Laravel Jetstream. It replaces the published authentication and profile scaffolding provided by Laravel Jetstream, with scaffolding that has support for Laravel Socialite. When linking a social account to an already authenticated user, the lack of a confirm…

📅 Published: Dec. 20, 2024, 7:59 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

9.4

CVSS4.0

CVE-2024-56333 - Remote code execution in onyxia-api

Onyxia is a web app that aims at being the glue between multiple open source backend technologies to provide a state of art working environment for data scientists. This critical vulnerability allows authenticated users to remotely execute code within the Onyxia-API, leading to potential consequenc…

📅 Published: Dec. 20, 2024, 7:52 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.8

CVSS3.1

CVE-2024-56331 - Local File Inclusion (LFI) via Improper URL Handling in uptime-kuma's `Real-Browser` monitor

Uptime Kuma is an open source, self-hosted monitoring tool. An **Improper URL Handling Vulnerability** allows an attacker to access sensitive local files on the server by exploiting the `file:///` protocol. This vulnerability is triggered via the **"real-browser"** request type, which takes a scree…

📅 Published: Dec. 20, 2024, 7:48 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 345025
Page 6983 of 34,503
« previous page » next page
Filters