CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-55099

Description: A SQL Injection vulnerability was found in /admin/index.php in phpgurukul Online Nurse Hiring System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the username parameter.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (6 months ago)

CVE-2024-54922

Description: A SQL Injection was found in /admin/edit_user.php of kashipara E-learning Management System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the firstname, lastname, and username parameters.

CVSS: LOW (0.0)

EPSS Score: 0.05%

Source: CVE
December 13th, 2024 (6 months ago)

CVE-2024-54918

Description: Kashipara E-learning Management System v1.0 is vulnerable to Remote Code Execution via File Upload in /teacher_avatar.php.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (6 months ago)

CVE-2024-54842

Description: A SQL injection vulnerability was found in phpgurukul Online Nurse Hiring System v1.0 in /admin/password-recovery.php via the mobileno parameter.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (6 months ago)

CVE-2024-54811

Description: A SQL injection vulnerability in /index.php in PHPGurukul Park Ticketing Management System v1.0 allows an attacker to execute arbitrary SQL commands via the "login" parameter.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (6 months ago)

CVE-2024-54810

Description: A SQL Injection vulnerability was found in /preschool/admin/password-recovery.php in PHPGurukul Pre-School Enrollment System Project v1.0, which allows remote attackers to execute arbitrary code via the mobileno parameter.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (6 months ago)

CVE-2024-54490

Description: This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Sequoia 15.2. A local attacker may gain access to user's Keychain items.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (6 months ago)

CVE-2024-50584

Description: An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (6 months ago)

CVE-2024-47947

Description: Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "Edit Disclaimer Text" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function which is available at the URL https://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre The stored Javascript payload will be executed every time the ScanWizard is loaded, even in the Kiosk-mode browser.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (6 months ago)

CVE-2024-45149

Description: Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A high-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on confidentiality. Exploitation of this issue does not require user interaction.

CVSS: LOW (2.7)

EPSS Score: 0.06%

Source: CVE
December 13th, 2024 (6 months ago)