Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-32655

Description: Npgsql is the .NET data provider for PostgreSQL. The `WriteBind()` method in `src/Npgsql/Internal/NpgsqlConnector.FrontendMessages.cs` uses `int` variables to store the message length and the sum of parameter lengths. Both variables overflow when the sum of parameter lengths becomes too large. This causes Npgsql to write a message size that is too small when constructing a Postgres protocol message to send it over the network to the database. When parsing the message, the database will only read a small number of bytes and treat any following bytes as new messages while they belong to the old message. Attackers can abuse this to inject arbitrary Postgres protocol messages into the connection, leading to the execution of arbitrary SQL statements on the application's behalf. This vulnerability is fixed in 4.0.14, 4.1.13, 5.0.18, 6.0.11, 7.0.7, and 8.0.3.

CVSS: HIGH (8.1)

EPSS Score: 0.05%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-31670

Description: rizin before v0.6.3 is vulnerable to Buffer Overflow via create_cache_bins, read_cache_accel, and rz_dyldcache_new_buf functions in librz/bin/format/mach0/dyldcache.c.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-31204

Description: mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability resides in the exception handling mechanism, specifically when not operating in DEV_MODE. The system saves exception details into a session array without proper sanitization or encoding. These details are later rendered into HTML and executed in a JavaScript block within the user's browser, without adequate escaping of HTML entities. This flaw allows for Cross-Site Scripting (XSS) attacks, where attackers can inject malicious scripts into the admin panel by triggering exceptions with controlled input. The exploitation method involves using any function that might throw an exception with user-controllable argument. This issue can lead to session hijacking and unauthorized administrative actions, posing a significant security risk. Version 2024-04 contains a fix for the issue.

CVSS: MEDIUM (6.1)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-30314

Description: Dreamweaver Desktop versions 21.3 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does require user interaction.

CVSS: HIGH (7.8)

EPSS Score: 0.06%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-30281

Description: Substance3D - Designer versions 13.1.1 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS: MEDIUM (5.5)

EPSS Score: 0.07%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-30270

Description: mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability is a combination of path traversal and arbitrary code execution, specifically targeting the `rspamd_maps()` function. It allows authenticated admin users to overwrite any file writable by the www-data user by exploiting improper path validation. The exploit chain can lead to the execution of arbitrary commands on the server. Version 2024-04 contains a patch for the issue.

CVSS: MEDIUM (6.2)

EPSS Score: 0.05%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-28146

Description: The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-28145

Description: An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-28144

Description: An attacker who can spoof the IP address and the User-Agent of a logged-in user can takeover the session because of flaws in the self-developed session management. If two users access the web interface from the same IP they are logged in as the other user.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-28143

Description: The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (5 months ago)