NA - CVE-2024-55186 - An IDOR (Insecure Direct Object Reference)...
An IDOR (Insecure Direct Object Reference) vulnerability exists in oqtane Framework 6.0.0, allowing a logged-in user to access inbox messages of other users by manipulating the notification ID in...
NA - CVE-2024-55470 - Oqtane Framework 6.0.0 is vulnerable to...
Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or...
NA - CVE-2024-55471 - Oqtane Framework is vulnerable to Insecure...
Oqtane Framework is vulnerable to Insecure Direct Object Reference (IDOR) in Oqtane.Controllers.UserController. This allows unauthorized users to access sensitive information of other users by...
NA - CVE-2024-56337 - Time-of-check Time-of-use (TOCTOU) Race...
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1...
NA - CVE-2024-12841 - A vulnerability was found in Emlog Pro up to...
A vulnerability was found in Emlog Pro up to 2.4.1. It has been classified as problematic. This affects an unknown part of the file /admin/tag.php. The manipulation of the argument keyword leads to...
NA - CVE-2024-55342 - A file upload functionality in Piranha CMS 11.1...
A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious JavaScript code, which is...
NA - CVE-2024-12842 - A vulnerability was found in Emlog Pro up to...
A vulnerability was found in Emlog Pro up to 2.4.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/user.php. The manipulation of the argument...
NA - CVE-2024-12867 - Server-Side Request Forgery in URL Mapper in...
Server-Side Request Forgery in URL Mapper in Arctic Security's Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to exfiltrate and modify configurations and data.