ID | CVSS | Summary | Last (major) update | Published | |
CVE-2024-41114 | None |
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `palette` variable on line 430 in `pages/1_??_Timelapse.py` takes user input, which is later used in the `eva
|
26-07-2024 - 21:15 | 26-07-2024 - 21:15 | |
CVE-2024-41115 | None |
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `palette` variable on line 488 in `pages/1_??_Timelapse.py` takes user input, which is later used in the `eva
|
26-07-2024 - 21:15 | 26-07-2024 - 21:15 | |
CVE-2024-41116 | None |
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `vis_params` variable on line 1254 in `pages/1_??_Timelapse.py` takes user input, which is later used in the
|
26-07-2024 - 21:15 | 26-07-2024 - 21:15 | |
CVE-2024-41117 | None |
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `vis_params` variable on line 115 in `pages/10_??_Earth_Engine_Datasets.py` takes user input, which is later
|
26-07-2024 - 21:15 | 26-07-2024 - 21:15 | |
CVE-2024-41118 | None |
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `url` variable on line 47 of `pages/7_??_Web_Map_Service.py` takes user input, which is passed to `get_layers
|
26-07-2024 - 21:15 | 26-07-2024 - 21:15 | |
CVE-2024-41119 | None |
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `vis_params` variable on line 80 in `8_???_Raster_Data_Visualization.py` takes user input, which is later use
|
26-07-2024 - 21:15 | 26-07-2024 - 21:15 | |
CVE-2024-41120 | None |
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `url` variable on line 63 of `pages/9_??_Vector_Data_Visualization.py` takes user input, which is later passe
|
26-07-2024 - 21:15 | 26-07-2024 - 21:15 | |
CVE-2024-41628 | None |
Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API.
|
26-07-2024 - 21:15 | 26-07-2024 - 21:15 | |
CVE-2024-41815 | None |
Starship is a cross-shell prompt. Starting in version 1.0.0 and prior to version 1.20.0, undocumented and unpredictable shell expansion and/or quoting rules make it easily to accidentally cause shell injection when using custom commands with starship
|
26-07-2024 - 21:15 | 26-07-2024 - 21:15 | |
CVE-2024-24623 | None |
Softaculous Webuzo contains a command injection vulnerability in the FTP management functionality. A remote, authenticated attacker can exploit this vulnerability to gain code execution on the system.
|
26-07-2024 - 21:15 | 25-07-2024 - 22:15 | |
CVE-2024-31971 | None |
**UNSUPPORTED WHEN ASSIGNED** Multiple stored cross-site scripting (XSS) vulnerabilities on AdTran NetVanta 3120 18.01.01.00.E devices allow remote attackers to inject arbitrary JavaScript, as demonstrated by /mainPassword.html, /processIdentity.html
|
26-07-2024 - 21:15 | 24-07-2024 - 15:15 | |
CVE-2024-28093 | None |
**UNSUPPORTED WHEN ASSIGNED** The TELNET service of AdTran NetVanta 3120 18.01.01.00.E devices is enabled by default, and has default credentials for a root-level account.
|
26-07-2024 - 21:15 | 26-03-2024 - 12:15 | |
CVE-2023-39667 | None |
D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the FUN_0000acb4 function.
|
26-07-2024 - 21:15 | 18-08-2023 - 03:15 | |
CVE-2021-3182 | 7.7 |
D-Link DCS-5220 devices have a buffer overflow. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
|
26-07-2024 - 21:15 | 19-01-2021 - 15:15 | |
CVE-2024-38508 | None |
A privilege escalation vulnerability was discovered in the web interface or SSH captive command shell interface of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via a specially crafted request.
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-38509 | None |
A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to execute arbitrary code via a specially crafted IPMI command.
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-38510 | None |
A privilege escalation vulnerability was discovered in the SSH captive command shell interface that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-38511 | None |
A privilege escalation vulnerability was discovered in an upload processing functionality of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-38512 | None |
A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-40116 | None |
An issue in Solar-Log 1000 before v2.8.2 and build 52-23.04.2013 was discovered to store plaintext passwords in the export.html, email.html, and sms.html files.
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-40117 | None |
Incorrect access control in Solar-Log 1000 before v2.8.2 and build 52- 23.04.2013 allows attackers to obtain Administrative privileges via connecting to the web administration server.
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-41112 | None |
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the palette variable in `pages/1_??_Timelapse.py` takes user input, which is later used in the `eval()` function
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-41113 | None |
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `vis_params` variable on line 383 or line 390 in `pages/1_??_Timelapse.py` takes user input, which is later u
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-4786 | None |
An improper validation vulnerability was reported in the Lenovo Tab K10 that could allow a specially crafted application to keep the device on.
|
26-07-2024 - 20:15 | 26-07-2024 - 20:15 | |
CVE-2024-24478 | None |
An issue in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the packet-bgp.c, dissect_bgp_open(tvbuff_t*tvb, proto_tree*tree, packet_info*pinfo), optlen components. NOTE: this is disputed by the vendor because neither
|
26-07-2024 - 20:15 | 21-02-2024 - 17:15 | |
CVE-2021-1647 | 7.2 |
Microsoft Defender Remote Code Execution Vulnerability
|
26-07-2024 - 20:03 | 12-01-2021 - 20:15 | |
CVE-2021-21193 | 6.8 |
Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
26-07-2024 - 20:02 | 16-03-2021 - 15:15 | |
CVE-2021-1870 | 7.5 |
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code exe
|
26-07-2024 - 20:01 | 02-04-2021 - 19:15 | |
CVE-2021-1871 | 7.5 |
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code exe
|
26-07-2024 - 20:01 | 02-04-2021 - 19:15 | |
CVE-2021-22506 | 5.0 |
Advance configuration exposing Information Leakage vulnerability in Micro Focus Access Manager product, affects all versions prior to version 5.0. The vulnerability could cause information leakage.
|
26-07-2024 - 20:01 | 26-03-2021 - 14:15 | |
CVE-2020-3566 | 7.8 |
A vulnerability in the Distance Vector Multicast Routing Protocol (DVMRP) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust process memory of an affected device. The vulnerability is due to insufficient queue
|
26-07-2024 - 19:55 | 29-08-2020 - 16:15 | |
CVE-2020-1464 | 2.1 |
A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files.
In an attack scenario, an attacker could by
|
26-07-2024 - 19:55 | 17-08-2020 - 19:15 | |
CVE-2020-1380 | 7.6 |
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the
|
26-07-2024 - 19:55 | 17-08-2020 - 19:15 | |
CVE-2020-25213 | 7.5 |
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows att
|
26-07-2024 - 19:54 | 09-09-2020 - 16:15 | |
CVE-2020-0878 | 5.1 |
<p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An
|
26-07-2024 - 19:54 | 11-09-2020 - 17:15 | |
CVE-2020-17144 | 6.0 |
Microsoft Exchange Remote Code Execution Vulnerability
|
26-07-2024 - 19:53 | 10-12-2020 - 00:15 | |
CVE-2020-16846 | 7.5 |
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
|
26-07-2024 - 19:53 | 06-11-2020 - 08:15 | |
CVE-2020-29583 | 10.0 |
Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the ssh server
|
26-07-2024 - 19:46 | 22-12-2020 - 22:15 | |
CVE-2021-41773 | 4.3 |
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directorie
|
26-07-2024 - 19:40 | 05-10-2021 - 09:15 | |
CVE-2021-37973 | 6.8 |
Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
|
26-07-2024 - 19:39 | 08-10-2021 - 22:15 | |
CVE-2021-30632 | 6.8 |
Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
26-07-2024 - 19:39 | 08-10-2021 - 21:15 | |
CVE-2021-30633 | 6.8 |
Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
|
26-07-2024 - 19:39 | 08-10-2021 - 21:15 | |
CVE-2021-42013 | 7.5 |
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these dire
|
26-07-2024 - 19:39 | 07-10-2021 - 16:15 | |
CVE-2021-37975 | 6.8 |
Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
26-07-2024 - 19:38 | 08-10-2021 - 22:15 | |
CVE-2021-37976 | 4.3 |
Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
|
26-07-2024 - 19:38 | 08-10-2021 - 22:15 | |
CVE-2021-36948 | 4.6 |
Windows Update Medic Service Elevation of Privilege Vulnerability
|
26-07-2024 - 19:30 | 12-08-2021 - 18:15 | |
CVE-2021-36942 | 5.0 |
Windows LSA Spoofing Vulnerability
|
26-07-2024 - 19:29 | 12-08-2021 - 18:15 | |
CVE-2021-36741 | 6.5 |
An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker
|
26-07-2024 - 19:26 | 29-07-2021 - 20:15 | |
CVE-2021-34448 | 9.3 |
Scripting Engine Memory Corruption Vulnerability
|
26-07-2024 - 19:26 | 16-07-2021 - 21:15 | |
CVE-2021-34473 | 10.0 |
Microsoft Exchange Server Remote Code Execution Vulnerability
|
26-07-2024 - 19:26 | 14-07-2021 - 18:15 |