CVE-2024-57513 |
Description: A floating-point exception (FPE) vulnerability exists in the AP4_TfraAtom::AP4_TfraAtom function in Bento4.
EPSS Score: 0.04%
January 30th, 2025 (6 months ago)
|
CVE-2024-57510 |
Description: Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_MemoryByteStream::WritePartial.
EPSS Score: 0.04%
January 30th, 2025 (6 months ago)
|
CVE-2024-57509 |
Description: Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_File::ParseStream and related functions.
EPSS Score: 0.04%
January 30th, 2025 (6 months ago)
|
CVE-2024-57439 |
Description: An issue in the reset password interface of ruoyi v4.8.0 allows attackers with Admin privileges to cause a Denial of Service (DoS) by duplicating the login name of the account.
EPSS Score: 0.05%
January 30th, 2025 (6 months ago)
|
CVE-2024-57438 |
Description: Insecure permissions in RuoYi v4.8.0 allows authenticated attackers to escalate privileges by assigning themselves higher level roles.
EPSS Score: 0.05%
January 30th, 2025 (6 months ago)
|
CVE-2024-57437 |
Description: RuoYi v4.8.0 was discovered to contain a SQL injection vulnerability via the orderby parameter at /monitor/online/list.
EPSS Score: 0.05%
January 30th, 2025 (6 months ago)
|
CVE-2024-57436 |
Description: RuoYi v4.8.0 was discovered to allow unauthorized attackers to view the session ID of the admin in the system monitoring. This issue can allow attackers to impersonate Admin users via using a crafted cookie.
EPSS Score: 0.05%
January 30th, 2025 (6 months ago)
|
CVE-2024-57395 |
Description: Password Vulnerability in Safety production process management system v1.0 allows a remote attacker to escalate privileges, execute arbitrary code and obtain sensitive information via the password and account number parameters.
EPSS Score: 0.04%
January 30th, 2025 (6 months ago)
|
CVE-2024-54852 |
Description: When LDAP connection is activated in Teedy versions between 1.9 to 1.12, the username field of the login form is vulnerable to LDAP injection. Due to improper sanitization of user input, an unauthenticated attacker is then able to perform various malicious actions, such as creating arbitrary accounts and spraying passwords.
EPSS Score: 0.04%
January 30th, 2025 (6 months ago)
|
CVE-2024-54851 |
Description: Teedy <= 1.12 is vulnerable to Cross Site Request Forgery (CSRF), due to the lack of CSRF protection.
EPSS Score: 0.04%
January 30th, 2025 (6 months ago)
|