CVE-2024-8601 : TECHEXCEL SOFTWARE SOLUTIONS BACK OFFICE SOFTWARE 0.X API ENDPOINT AUTHORIZATION
Description This vulnerability exists in TechExcel Back Office Software versions prior to 1.0.0 due to improper access controls on certain
Description This vulnerability exists in TechExcel Back Office Software versions prior to 1.0.0 due to improper access controls on certain
API gateways play a key role in today’s digital security, acting as an essential safety net to protect APIs from
Description A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document
Description Orca HCM from LEARNING DIGITAL does not properly restrict access to a specific functionality, allowing unauthenticated remote attacker to
Description Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows
Description IBM MQ Operator 2.0.26 and 3.2.4 could allow an authenticated user in a specifically defined role, to bypass security
Description A vulnerability, which was classified as critical, has been found in itsourcecode Payroll Management System 1.0. This issue affects
Description A vulnerability was found in SourceCodesters Clinics Patient Management System 2.0. It has been rated as critical. This issue
Description A vulnerability was found in lmxcms up to 1.4 and classified as critical. Affected by this issue is the
Description Dovecot accepts dot LF DOT LF symbol as end of DATA command. RFC requires that it should always be
GDPR 2.0, the forthcoming update to the General Data Protection Regulation, is set to redefine data privacy and security standards
Description A vulnerability, which was classified as problematic, was found in Wavelog up to 1.8.0. Affected is the function index
Description Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in DataFlowX Technology DataDiodeX allows Path Traversal.
Description Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic
Description A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE). References
Description The issue was addressed by suspending Persona when the virtual keyboard is active. This issue is fixed in visionOS
Description FlyCASS CASS and KCM systems did not correctly filter SQL queries, which made them vulnerable to attack by outside
Description Dell SmartFabric OS10 Software, version(s) 10.5.5.4 through 10.5.5.10 and 10.5.6.x , contain(s) an Improper Neutralization of Special Elements used
Description The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to unauthorized modification of data due
GraphQL API security is critical to protecting your application from threats and vulnerabilities. GraphQL, with its simple and efficient data
Description The improper neutralization of special elements in the parameter “host” in the CGI program of Zyxel NWA1123ACv3 firmware version
Description The registration process of uniFLOW Online (NT-ware product) apps, prior to and including version 2024.1.0, can be compromised when
Description D-Link DAP-2310 Hardware A Firmware 1.16RC028 allows remote attackers to execute arbitrary code via a stack-based buffer overflow in
Description ASIS (aka Aplikasi Sistem Sekolah using CodeIgniter 3) 3.0.0 through 3.2.0 allows index.php username SQL injection for Authentication Bypass.