CVE-2024-23649 |
Description: Lemmy is a link aggregator and forum for the fediverse. Starting in version 0.17.0 and prior to version 0.19.1, users can report private messages, even when they're neither sender nor recipient of the message. The API response to creating a private message report contains the private message itself, which means any user can just iterate over message ids to (loudly) obtain all private messages of an instance. A user with instance admin privileges can also abuse this if the private message is removed from the response, as they're able to see the resulting reports.
Creating a private message report by POSTing to `/api/v3/private_message/report` does not validate whether the reporter is the recipient of the message. lemmy-ui does not allow the sender to report the message; the API method should likely be restricted to accessible to recipients only. The API response when creating a report contains the `private_message_report_view` with all the details of the report, including the private message that has been reported:
Any authenticated user can obtain arbitrary (untargeted) private message contents. Privileges required depend on the instance configuration; when registrations are enabled without application system, the privileges required are practically none. When registration applications are required, privileges required could be considered low, but this assessment heavily varies by instance.
Version 0.19.1 contains a patch for this issue. A workaround is available. If an...
CVSS: HIGH (7.5) EPSS Score: 0.21% SSVC Exploitation: none
May 30th, 2025 (9 days ago)
|
CVE-2024-23646 |
Description: Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The application allows users to create zip files from available files on the site. In the 1.x branch prior to version 1.3.2, parameter `selectedIds` is susceptible to SQL Injection. Any backend user with very basic permissions can execute arbitrary SQL statements and thus alter any data or escalate their privileges to at least admin level. Version 1.3.2 contains a fix for this issue.
CVSS: HIGH (8.8) EPSS Score: 0.1% SSVC Exploitation: poc
May 30th, 2025 (9 days ago)
|
CVE-2024-23348 |
Description: Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary JavaScript code by uploading a specially crafted SVG file.
CVSS: HIGH (8.8) EPSS Score: 0.35% SSVC Exploitation: none
May 30th, 2025 (9 days ago)
|
CVE-2024-23345 |
Description: Nautobot is a Network Source of Truth and Network Automation Platform built as a web application. All users of Nautobot versions earlier than 1.6.10 or 2.1.2 are potentially impacted by a cross-site scripting vulnerability. Due to inadequate input sanitization, any user-editable fields that support Markdown rendering, including are potentially susceptible to cross-site scripting (XSS) attacks via maliciously crafted data. This issue is fixed in Nautobot versions 1.6.10 and 2.1.2.
CVSS: HIGH (7.1) EPSS Score: 0.3% SSVC Exploitation: none
May 30th, 2025 (9 days ago)
|
CVE-2024-23342 |
Description: The `ecdsa` PyPI package is a pure Python implementation of ECC (Elliptic Curve Cryptography) with support for ECDSA (Elliptic Curve Digital Signature Algorithm), EdDSA (Edwards-curve Digital Signature Algorithm) and ECDH (Elliptic Curve Diffie-Hellman). Versions 0.18.0 and prior are vulnerable to the Minerva attack. As of time of publication, no known patched version exists.
CVSS: HIGH (7.4) EPSS Score: 0.46% SSVC Exploitation: poc
May 30th, 2025 (9 days ago)
|
CVE-2024-23182 |
Description: Relative path traversal vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to delete arbitrary files on the server.
CVSS: HIGH (8.1) EPSS Score: 2.0% SSVC Exploitation: none
May 30th, 2025 (9 days ago)
|
CVE-2024-22956 |
Description: swftools 0.9.2 was discovered to contain a heap-use-after-free vulnerability via the function removeFromTo at swftools/src/swfc.c:838
CVSS: HIGH (7.8) EPSS Score: 0.05% SSVC Exploitation: poc
May 30th, 2025 (9 days ago)
|
CVE-2024-22913 |
Description: A heap-buffer-overflow was found in SWFTools v0.9.2, in the function swf5lex at lex.swf5.c:1321. It allows an attacker to cause code execution.
CVSS: HIGH (7.8) EPSS Score: 0.05% SSVC Exploitation: poc
May 30th, 2025 (9 days ago)
|
CVE-2024-22769 |
Description: Improper Input Validation in Hitron Systems DVR HVR-8781 1.03~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.
CVSS: HIGH (7.4) EPSS Score: 0.22% SSVC Exploitation: none
May 30th, 2025 (9 days ago)
|
CVE-2024-22768 |
Description: Improper Input Validation in Hitron Systems DVR HVR-4781 1.03~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.
CVSS: HIGH (7.4) EPSS Score: 0.36% SSVC Exploitation: none
May 30th, 2025 (9 days ago)
|