CVE-2024-25114 |
Description: Collabora Online is a collaborative online office suite based on LibreOffice technology. Each document in Collabora Online is opened by a separate "Kit" instance in a different "jail" with a unique directory "jailID" name. For security reasons, this directory name is randomly generated and should not be given out to the client. In affected versions of Collabora Online it is possible to use the CELL() function, with the "filename" argument, in the spreadsheet component to get a path which includes this JailID. The impact of this vulnerability in its own is low because it requires to be chained with another vulnerability. Users should upgrade to Collabora Online 23.05.9; Collabora Online 22.05.22; Collabora Online 21.11.10 or higher. There are no known workarounds for this vulnerability.
CVSS: LOW (2.6) EPSS Score: 0.17% SSVC Exploitation: none
April 16th, 2025 (7 days ago)
|
CVE-2024-2364 |
Description: A vulnerability classified as problematic has been found in Musicshelf 1.0/1.1 on Android. Affected is an unknown function of the file androidmanifest.xml of the component Backup Handler. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256320. Es wurde eine problematische Schwachstelle in Musicshelf 1.0/1.1 für Android entdeckt. Es betrifft eine unbekannte Funktion der Datei androidmanifest.xml der Komponente Backup Handler. Durch das Beeinflussen mit unbekannten Daten kann eine exposure of backup file to an unauthorized control sphere-Schwachstelle ausgenutzt werden. Ein Angriff setzt physischen Zugriff auf dem Zielobjekt voraus. Der Exploit steht zur öffentlichen Verfügung.
CVSS: LOW (1.8) EPSS Score: 0.02% SSVC Exploitation: poc
April 16th, 2025 (7 days ago)
|
CVE-2024-23609 |
Description: An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.
CVSS: HIGH (7.8) EPSS Score: 0.29% SSVC Exploitation: none
April 16th, 2025 (7 days ago)
|
CVE-2024-2331 |
Description: A vulnerability was found in SourceCodester Tourist Reservation System 1.0. It has been declared as critical. This vulnerability affects the function ad_writedata of the file System.cpp. The manipulation of the argument ad_code leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-256282 is the identifier assigned to this vulnerability. In SourceCodester Tourist Reservation System 1.0 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion ad_writedata der Datei System.cpp. Durch Manipulation des Arguments ad_code mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
CVSS: MEDIUM (6.3) EPSS Score: 0.08% SSVC Exploitation: none
April 16th, 2025 (7 days ago)
|
CVE-2024-22008 |
Description: In config_gov_time_windows of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
EPSS Score: 0.02% SSVC Exploitation: none
April 16th, 2025 (7 days ago)
|
CVE-2024-20832 |
Description: Heap overflow in Little Kernel in bootloader prior to SMR Mar-2024 Release 1 allows local privileged attackers to execute arbitrary code.
CVSS: MEDIUM (6.4) EPSS Score: 0.06% SSVC Exploitation: none
April 16th, 2025 (7 days ago)
|
CVE-2024-1986 |
Description: The Booster Elite for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the wc_add_new_product() function in all versions up to, and including, 7.1.7. This makes it possible for customer-level attackers, and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. This is only exploitable when the user product upload functionality is enabled.
CVSS: HIGH (8.8) EPSS Score: 4.32% SSVC Exploitation: none
April 16th, 2025 (7 days ago)
|
CVE-2024-1851 |
Description: The affiliate-toolkit – WordPress Affiliate Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the atkp_create_list() function in all versions up to, and including, 3.5.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to to perform unauthorized actions such as creating product lists.
CVSS: MEDIUM (6.3) EPSS Score: 0.05% SSVC Exploitation: none
April 16th, 2025 (7 days ago)
|
CVE-2024-1769 |
Description: The JM Twitter Cards plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 12 via the meta description data. This makes it possible for unauthenticated attackers to view password protected post content when viewing the page source.
CVSS: MEDIUM (5.3) EPSS Score: 0.22% SSVC Exploitation: none
April 16th, 2025 (7 days ago)
|
CVE-2024-0199 |
Description: An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2. An attacker could bypass CODEOWNERS by utilizing a crafted payload in an old feature branch to perform malicious actions.
CVSS: HIGH (7.7) EPSS Score: 0.01% SSVC Exploitation: poc
April 16th, 2025 (7 days ago)
|