Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-21517

Description: This affects versions of the package opencart/opencart from 4.0.0.0. A reflected XSS issue was identified in the redirect parameter of customer account/login route. An attacker can inject arbitrary HTML and Javascript into the page response. As this vulnerability is present in the account functionality it could be used to target and attack customers of the OpenCart shop. **Notes:** 1) The fix for this vulnerability is incomplete

CVSS: LOW (2.1)

EPSS Score: 0.05%

Source: CVE
January 15th, 2025 (3 months ago)

CVE-2024-21516

Description: This affects versions of the package opencart/opencart from 4.0.0.0 and before 4.1.0.0. A reflected XSS issue was identified in the directory parameter of admin common/filemanager.list route. An attacker could obtain a user's token by tricking the user to click on a maliciously crafted URL. The user is then prompted to login and redirected again upon authentication with the payload automatically executing. If the attacked user has admin privileges, this vulnerability could be used as the start of a chain of exploits like Zip Slip or arbitrary file write vulnerabilities in the admin functionality. **Notes:** 1) This is only exploitable if the attacker knows the name or path of the admin directory. The name of the directory is "admin" by default but there is a pop-up in the dashboard warning users to rename it. 2) The fix for this vulnerability is incomplete. The redirect is removed so that it is not possible for an attacker to control the redirect post admin login anymore, but it is still possible to exploit this issue in admin if the user is authenticated as an admin already.

CVSS: LOW (2.1)

EPSS Score: 0.05%

Source: CVE
January 15th, 2025 (3 months ago)

CVE-2024-21515

Description: This affects versions of the package opencart/opencart from 4.0.0.0. A reflected XSS issue was identified in the filename parameter of the admin tool/log route. An attacker could obtain a user's token by tricking the user to click on a maliciously crafted URL. The user is then prompted to login and redirected again upon authentication with the payload automatically executing. If the attacked user has admin privileges, this vulnerability could be used as the start of a chain of exploits like Zip Slip or arbitrary file write vulnerabilities in the admin functionality. **Notes:** 1) This is only exploitable if the attacker knows the name or path of the admin directory. The name of the directory is "admin" by default but there is a pop-up in the dashboard warning users to rename it. 2) The fix for this vulnerability is incomplete. The redirect is removed so that it is not possible for an attacker to control the redirect post admin login anymore, but it is still possible to exploit this issue in admin if the user is authenticated as an admin already.

CVSS: LOW (2.1)

EPSS Score: 0.05%

Source: CVE
January 15th, 2025 (3 months ago)

CVE-2024-42181

Description: HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability. The application transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

CVSS: LOW (1.6)

EPSS Score: 0.04%

Source: CVE
January 13th, 2025 (3 months ago)

CVE-2024-42180

Description: HCL MyXalytics is affected by a malicious file upload vulnerability. The application accepts invalid file uploads, including incorrect content types, double extensions, null bytes, and special characters, allowing attackers to upload and execute malicious files.

CVSS: LOW (1.6)

EPSS Score: 0.04%

Source: CVE
January 13th, 2025 (3 months ago)

CVE-2024-42179

Description: HCL MyXalytics is affected by sensitive information disclosure vulnerability. The HTTP response header exposes the Microsoft-HTTP API∕2.0 as the server's name & version.

CVSS: LOW (2.0)

EPSS Score: 0.04%

Source: CVE
January 13th, 2025 (3 months ago)

CVE-2024-42175

Description: HCL MyXalytics is affected by a weak input validation vulnerability. The application accepts special characters and there is no length validation. This can lead to security vulnerabilities like SQL injection, XSS, and buffer overflow.

CVSS: LOW (2.6)

EPSS Score: 0.04%

Source: CVE
January 12th, 2025 (3 months ago)

CVE-2024-42174

Description: HCL MyXalytics is affected by username enumeration vulnerability. This allows a malicious user to perform enumeration of application users, and therefore compile a list of valid usernames.

CVSS: LOW (3.7)

EPSS Score: 0.04%

Source: CVE
January 12th, 2025 (3 months ago)

CVE-2025-23113

Description: An issue was discovered in REDCap 14.9.6. It has an action=myprojects&logout=1 CSRF issue in the alert-title while performing an upload of a CSV file containing a list of alert configuration. An attacker can send the victim a CSV file containing an HTML injection payload in the alert-title. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim click on the alert-title value, it can trigger a logout request and terminates their session, or redirect to a phishing website. This vulnerability stems from the absence of CSRF protections on the logout functionality.

CVSS: LOW (3.4)

EPSS Score: 0.04%

Source: CVE
January 11th, 2025 (3 months ago)

CVE-2025-22449

Description: Mattermost versions 9.11.x <= 9.11.5 fail to enforce invite permissions, which allows team admins, with no permission to invite users to their team, to invite users by updating the "allow_open_invite" field via making their team public.

CVSS: LOW (3.8)

EPSS Score: 0.04%

Source: CVE
January 10th, 2025 (3 months ago)