Exploit Database

137,690 exploits tracked across all sources.

Sort: Activity Stars
CVE-2024-23818 WRITEUP MEDIUM
Geoserver < 2.23.3 - XSS
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.3 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the WMS GetMap OpenLayers Output Format. Access to the WMS OpenLayers Format is available to all users by default although data and service security may limit users' ability to trigger the XSS. Versions 2.23.3 and 2.24.1 contain a patch for this issue.
CVSS 4.8
CVE-2024-23819 WRITEUP MEDIUM
Geoserver < 2.23.4 - XSS
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the MapML HTML Page. The MapML extension must be installed and access to the MapML HTML Page is available to all users although data security may limit users' ability to trigger the XSS. Versions 2.23.4 and 2.24.1 contain a patch for this issue.
CVSS 4.8
CVE-2024-23824 WRITEUP MEDIUM
Mailcow < 2024-01 - Denial of Service
mailcow is a dockerized email package, with multiple containers linked in one bridged network. The application is vulnerable to pixel flood attack, once the payload has been successfully uploaded in the logo the application goes slow and doesn't respond in the admin page. It is tested on the versions 2023-12a and prior and patched in version 2024-01.
CVSS 4.7
CVE-2024-23835 WRITEUP HIGH
Oisf Suricata < 7.0.3 - Denial of Service
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.3, excessive memory use during pgsql parsing could lead to OOM-related crashes. This vulnerability is patched in 7.0.3. As workaround, users can disable the pgsql app layer parser.
CVSS 7.5
CVE-2024-23836 WRITEUP HIGH
Oisf Suricata < 6.0.16 - Resource Allocation Without Limits
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to versions 6.0.16 and 7.0.3, an attacker can craft traffic to cause Suricata to use far more CPU and memory for processing the traffic than needed, which can lead to extreme slow downs and denial of service. This vulnerability is patched in 6.0.16 or 7.0.3. Workarounds include disabling the affected protocol app-layer parser in the yaml and reducing the `stream.reassembly.depth` value helps reduce the severity of the issue.
CVSS 7.5
CVE-2024-23945 WRITEUP MEDIUM
Apache Hive < 4.0.0 - Error Information Exposure
Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitation. The vulnerable CookieSigner logic was introduced in Apache Hive by HIVE-9710 (1.2.0) and in Apache Spark by SPARK-14987 (2.0.0). The affected components are the following: * org.apache.hive:hive-service * org.apache.spark:spark-hive-thriftserver_2.11 * org.apache.spark:spark-hive-thriftserver_2.12
CVSS 5.9
CVE-2024-23945 WRITEUP MEDIUM
Apache Hive < 4.0.0 - Error Information Exposure
Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitation. The vulnerable CookieSigner logic was introduced in Apache Hive by HIVE-9710 (1.2.0) and in Apache Spark by SPARK-14987 (2.0.0). The affected components are the following: * org.apache.hive:hive-service * org.apache.spark:spark-hive-thriftserver_2.11 * org.apache.spark:spark-hive-thriftserver_2.12
CVSS 5.9
CVE-2024-23953 WRITEUP MEDIUM
Apache Hive < 4.0.0 - Denial of Service
Use of Arrays.equals() in LlapSignerImpl in Apache Hive to compare message signatures allows attacker to forge a valid signature for an arbitrary message byte by byte. The attacker should be an authorized user of the product to perform this attack. Users are recommended to upgrade to version 4.0.0, which fixes this issue. The problem occurs when an application doesn’t use a constant-time algorithm for validating a signature. The method Arrays.equals() returns false right away when it sees that one of the input’s bytes are different. It means that the comparison time depends on the contents of the arrays. This little thing may allow an attacker to forge a valid signature for an arbitrary message byte by byte. So it might allow malicious users to submit splits/work with selected signatures to LLAP without running as a privileged user, potentially leading to DDoS attack. More details in the reference section.
CVSS 6.5
CVE-2024-24034 WRITEUP MEDIUM
Setorinformatica S.i.l - Open Redirect
Setor Informatica S.I.L version 3.0 is vulnerable to Open Redirect via the hprinter parameter, allows remote attackers to execute arbitrary code.
CVSS 6.1
CVE-2024-24035 WRITEUP MEDIUM
Setorinformatica S.i.l. - XSS
Cross Site Scripting (XSS) vulnerability in Setor Informatica SIL 3.1 allows attackers to run arbitrary code via the hmessage parameter.
CVSS 6.1
CVE-2024-24042 WRITEUP HIGH
Net.devtech Arrp < 0.8.2 - Path Traversal
Directory Traversal vulnerability in Devan-Kerman ARRP v.0.8.1 and before allows a remote attacker to execute arbitrary code via the dumpDirect in RuntimeResourcePackImpl component.
CVSS 8.8
CVE-2024-24043 WRITEUP MEDIUM
Speedy11CZ MCRPX <1.4.0 - Path Traversal
Directory Traversal vulnerability in Speedy11CZ MCRPX v.1.4.0 and before allows a local attacker to execute arbitrary code via a crafted file.
CVSS 5.5
CVE-2024-24116 WRITEUP CRITICAL
Ruijie RG-NBS2009G-P - Improper Authentication
An issue in Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release(9736) allows a remote attacker to gain privileges via the system/config_menu.htm.
CVSS 9.8
CVE-2024-24117 WRITEUP CRITICAL
Ruijie Rg-nbs2009g-p Firmware - Incorrect Permission Assignment
Insecure Permissions vulnerability in Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release (9736) allows a remote attacker to gain privileges via the login check state component.
CVSS 9.8
CVE-2024-24122 WRITEUP LOW
Wondershare Edraw - Path Traversal
A remote code execution vulnerability in the project management of Wanxing Technology's Yitu project which allows an attacker to use the exp.adpx file as a zip compressed file to construct a special file name, which can be used to decompress the project file into the system startup folder, restart the system, and automatically execute the constructed attack script.
CVSS 3.3
CVE-2024-24134 WRITEUP MEDIUM
Remyandrade Online Food Menu - XSS
Sourcecodester Online Food Menu 1.0 is vulnerable to Cross Site Scripting (XSS) via the 'Menu Name' and 'Description' fields in the Update Menu section.
CVSS 4.8
CVE-2024-24135 WRITEUP MEDIUM
Remyandrade Product Inventory With Export TO Excel - XSS
Product Name and Product Code in the 'Add Product' section of Sourcecodester Product Inventory with Export to Excel 1.0 are vulnerable to XSS attacks.
CVSS 6.1
CVE-2024-24136 WRITEUP MEDIUM
Remyandrade Math Game - XSS
The 'Your Name' field in the Submit Score section of Sourcecodester Math Game with Leaderboard v1.0 is vulnerable to Cross-Site Scripting (XSS) attacks.
CVSS 6.1
CVE-2024-24139 WRITEUP HIGH
Remyandrade Login System With Email Verification - SQL Injection
Sourcecodester Login System with Email Verification 1.0 allows SQL Injection via the 'user' parameter.
CVSS 7.2
CVE-2024-24140 WRITEUP HIGH
Remyandrade Daily Habit Tracker - SQL Injection
Sourcecodester Daily Habit Tracker App 1.0 allows SQL Injection via the parameter 'tracker.'
CVSS 7.2
CVE-2024-24141 WRITEUP CRITICAL
Remyandrade School Task Manager - SQL Injection
Sourcecodester School Task Manager App 1.0 allows SQL Injection via the 'task' parameter.
CVSS 9.8
CVE-2024-24142 WRITEUP CRITICAL
Rems School Task Manager - SQL Injection
Sourcecodester School Task Manager 1.0 allows SQL Injection via the 'subject' parameter.
CVSS 9.8
CVE-2024-24399 WRITEUP HIGH
Lepton-cms Leptoncms - Unrestricted File Upload
An arbitrary file upload vulnerability in LEPTON v7.0.0 allows authenticated attackers to execute arbitrary PHP code by uploading this code to the backend/languages/index.php languages area.
CVSS 7.2
CVE-2024-24407 WRITEUP MEDIUM
Mayurik Best Courier Management System - SQL Injection
SQL Injection vulnerability in Best Courier management system v.1.0 allows a remote attacker to obtain sensitive information via print_pdets.php component.
CVSS 5.3
CVE-2024-24426 WRITEUP HIGH
OpenAirInterface Magma <1.8.0/OAI EPC Federation <1.2.0 - DoS
Reachable assertions in the NGAP_FIND_PROTOCOLIE_BY_ID function of OpenAirInterface Magma v1.8.0 and OAI EPC Federation v1.2.0 allow attackers to cause a Denial of Service (DoS) via a crafted NGAP packet.
CVSS 7.5