CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-57513

Description: A floating-point exception (FPE) vulnerability exists in the AP4_TfraAtom::AP4_TfraAtom function in Bento4.

EPSS Score: 0.04%

Source: CVE
January 30th, 2025 (6 months ago)

CVE-2024-57510

Description: Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_MemoryByteStream::WritePartial.

EPSS Score: 0.04%

Source: CVE
January 30th, 2025 (6 months ago)

CVE-2024-57509

Description: Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_File::ParseStream and related functions.

EPSS Score: 0.04%

Source: CVE
January 30th, 2025 (6 months ago)

CVE-2024-57439

Description: An issue in the reset password interface of ruoyi v4.8.0 allows attackers with Admin privileges to cause a Denial of Service (DoS) by duplicating the login name of the account.

EPSS Score: 0.05%

Source: CVE
January 30th, 2025 (6 months ago)

CVE-2024-57438

Description: Insecure permissions in RuoYi v4.8.0 allows authenticated attackers to escalate privileges by assigning themselves higher level roles.

EPSS Score: 0.05%

Source: CVE
January 30th, 2025 (6 months ago)

CVE-2024-57437

Description: RuoYi v4.8.0 was discovered to contain a SQL injection vulnerability via the orderby parameter at /monitor/online/list.

EPSS Score: 0.05%

Source: CVE
January 30th, 2025 (6 months ago)

CVE-2024-57436

Description: RuoYi v4.8.0 was discovered to allow unauthorized attackers to view the session ID of the admin in the system monitoring. This issue can allow attackers to impersonate Admin users via using a crafted cookie.

EPSS Score: 0.05%

Source: CVE
January 30th, 2025 (6 months ago)

CVE-2024-57395

Description: Password Vulnerability in Safety production process management system v1.0 allows a remote attacker to escalate privileges, execute arbitrary code and obtain sensitive information via the password and account number parameters.

EPSS Score: 0.04%

Source: CVE
January 30th, 2025 (6 months ago)

CVE-2024-54852

Description: When LDAP connection is activated in Teedy versions between 1.9 to 1.12, the username field of the login form is vulnerable to LDAP injection. Due to improper sanitization of user input, an unauthenticated attacker is then able to perform various malicious actions, such as creating arbitrary accounts and spraying passwords.

EPSS Score: 0.04%

Source: CVE
January 30th, 2025 (6 months ago)

CVE-2024-54851

Description: Teedy <= 1.12 is vulnerable to Cross Site Request Forgery (CSRF), due to the lack of CSRF protection.

EPSS Score: 0.04%

Source: CVE
January 30th, 2025 (6 months ago)