A heap-based buffer under-read in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) via a crafted MOV video file.
Source: MITRE
Max CVSS
N/A
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Jenkins Shared Library Version Override Plugin 17.v786074c9fce7 and earlier declares folder-scoped library overrides as trusted, so that they're not executed in the Script Security sandbox, allowing attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection.
Source: Jenkins Project
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-11-13
Updated
2024-11-13
Jenkins OpenId Connect Authentication Plugin 4.418.vccc7061f5b_6d and earlier does not invalidate the previous session on login.
Source: Jenkins Project
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-11-13
Updated
2024-11-13
Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Source: Jenkins Project
Max CVSS
8.0
EPSS Score
0.04%
Published
2024-11-13
Updated
2024-11-14
Jenkins Pipeline: Declarative Plugin 2.2214.vb_b_34b_2ea_9b_83 and earlier does not check whether the main (Jenkinsfile) script used to restart a build from a specific stage is approved, allowing attackers with Item/Build permission to restart a previous build whose (Jenkinsfile) script is no longer approved.
Source: Jenkins Project
Max CVSS
8.0
EPSS Score
0.04%
Published
2024-11-13
Updated
2024-11-14
Jenkins Pipeline: Groovy Plugin 3990.vd281dd77a_388 and earlier, except 3975.3977.v478dd9e956c3 does not check whether the main (Jenkinsfile) script for a rebuilt build is approved, allowing attackers with Item/Build permission to rebuild a previous build whose (Jenkinsfile) script is no longer approved.
Source: Jenkins Project
Max CVSS
N/A
EPSS Score
0.04%
Published
2024-11-13
Updated
2024-11-13
Jenkins Script Security Plugin 1367.vdf2fc45f229c and earlier, except 1365.1367.va_3b_b_89f8a_95b_ and 1362.1364.v4cf2dc5d8776, does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files on the controller file system.
Source: Jenkins Project
Max CVSS
4.3
EPSS Score
0.04%
Published
2024-11-13
Updated
2024-11-13
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
Source: MITRE
Max CVSS
9.8
EPSS Score
0.05%
Published
2024-11-11
Updated
2024-11-12
GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.05%
Published
2024-11-11
Updated
2024-11-12
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this.
Source: MITRE
Max CVSS
8.4
EPSS Score
0.04%
Published
2024-11-11
Updated
2024-11-12
GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.05%
Published
2024-11-11
Updated
2024-11-12
Giskard is an evaluation and testing framework for AI systems. A Remote Code Execution (ReDoS) vulnerability was discovered in Giskard component by the GitHub Security Lab team. When processing datasets with specific text patterns with Giskard detectors, this vulnerability could trigger exponential regex evaluation times, potentially leading to denial of service. Giskard versions prior to 2.15.5 are affected.
Source: GitHub, Inc.
Max CVSS
6.9
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
matrix-appservice-irc is a Node.js IRC bridge for the Matrix messaging protocol. The provisioning API of the matrix-appservice-irc bridge up to version 3.0.2 contains a vulnerability which can lead to arbitrary IRC command execution as the bridge IRC bot. The vulnerability has been patched in matrix-appservice-irc version 3.0.3.
Source: GitHub, Inc.
Max CVSS
5.4
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in realmag777 WOLF allows Path Traversal.This issue affects WOLF: from n/a through 1.0.8.3.
Source: Patchstack
Max CVSS
4.9
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.1.15.
Source: Patchstack
Max CVSS
9.1
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Unrestricted Upload of File with Dangerous Type vulnerability in Sage AI Sage AI: Chatbots, OpenAI GPT-4 Bulk Articles, Dalle-3 Image Generation allows Upload a Web Shell to a Web Server.This issue affects Sage AI: Chatbots, OpenAI GPT-4 Bulk Articles, Dalle-3 Image Generation: from n/a through 2.4.9.
Source: Patchstack
Max CVSS
9.9
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Missing Authorization vulnerability in KCT Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One: from n/a through 2.1.2.
Source: Patchstack
Max CVSS
7.5
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Missing Authorization vulnerability in Medma Technologies Matix Popup Builder allows Privilege Escalation.This issue affects Matix Popup Builder: from n/a through 1.0.0.
Source: Patchstack
Max CVSS
9.8
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Shoaib Rehmat ZIJ KART allows PHP Local File Inclusion.This issue affects ZIJ KART: from n/a through 1.1.
Source: Patchstack
Max CVSS
8.1
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Unrestricted Upload of File with Dangerous Type vulnerability in Softpulse Infotech Picsmize allows Upload a Web Shell to a Web Server.This issue affects Picsmize: from n/a through 1.0.0.
Source: Patchstack
Max CVSS
10.0
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Unrestricted Upload of File with Dangerous Type vulnerability in Kinetic Innovative Technologies Sdn Bhd kineticPay for WooCommerce allows Upload a Web Shell to a Web Server.This issue affects kineticPay for WooCommerce: from n/a through 2.0.8.
Source: Patchstack
Max CVSS
10.0
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Labs64 DigiPass allows Absolute Path Traversal.This issue affects DigiPass: from n/a through 0.3.0.
Source: Patchstack
Max CVSS
7.5
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Unrestricted Upload of File with Dangerous Type vulnerability in BdThemes Instant Image Generator allows Upload a Web Shell to a Web Server.This issue affects Instant Image Generator: from n/a through 1.5.4.
Source: Patchstack
Max CVSS
10.0
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Unrestricted Upload of File with Dangerous Type vulnerability in cmsMinds Boat Rental Plugin for WordPress allows Upload a Web Shell to a Web Server.This issue affects Boat Rental Plugin for WordPress: from n/a through 1.0.1.
Source: Patchstack
Max CVSS
10.0
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Unrestricted Upload of File with Dangerous Type vulnerability in Arttia Creative Datasets Manager by Arttia Creative.This issue affects Datasets Manager by Arttia Creative: from n/a through 1.5.
Source: Patchstack
Max CVSS
10.0
EPSS Score
N/A
Published
2024-11-14
Updated
2024-11-14
Page: 1
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!