Lucene search

K

Shopping Cart & ECommerce Store Security Vulnerabilities

kitploit
kitploit

VectorKernel - PoCs For Kernelmode Rootkit Techniques Research

PoCs for Kernelmode rootkit techniques research or education. Currently focusing on Windows OS. All modules support 64bit OS only. NOTE Some modules use ExAllocatePool2 API to allocate kernel pool memory. ExAllocatePool2 API is not supported in OSes older than Windows 10 Version 2004. If you want.....

7.6AI Score

2024-04-18 12:30 PM
18
nvd
nvd

CVE-2023-50885

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AGILELOGIX Store Locator WordPress.This issue affects Store Locator WordPress: from n/a through...

6.8CVSS

6.6AI Score

0.0004EPSS

2024-04-18 11:15 AM
cve
cve

CVE-2023-50885

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AGILELOGIX Store Locator WordPress.This issue affects Store Locator WordPress: from n/a through...

6.8CVSS

6.5AI Score

0.0004EPSS

2024-04-18 11:15 AM
46
cvelist
cvelist

CVE-2023-50885 WordPress Store Locator WordPress Plugin <= 1.4.14 is vulnerable to Arbitrary File Deletion

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AGILELOGIX Store Locator WordPress.This issue affects Store Locator WordPress: from n/a through...

6.8CVSS

6.8AI Score

0.0004EPSS

2024-04-18 11:00 AM
2
thn
thn

New Android Trojan 'SoumniBot' Evades Detection with Clever Tricks

A new Android trojan called SoumniBot has been detected in the wild targeting users in South Korea by leveraging weaknesses in the manifest extraction and parsing procedure. The malware is "notable for an unconventional approach to evading analysis and detection, namely obfuscation of the Android.....

7AI Score

2024-04-18 10:31 AM
35
nvd
nvd

CVE-2024-32558

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in impleCode eCommerce Product Catalog allows Reflected XSS.This issue affects eCommerce Product Catalog: from n/a through...

7.1CVSS

6.9AI Score

0.0004EPSS

2024-04-18 10:15 AM
cve
cve

CVE-2024-32558

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in impleCode eCommerce Product Catalog allows Reflected XSS.This issue affects eCommerce Product Catalog: from n/a through...

7.1CVSS

6.8AI Score

0.0004EPSS

2024-04-18 10:15 AM
29
cvelist
cvelist

CVE-2024-32558 WordPress eCommerce Product Catalog plugin <= 3.3.32 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in impleCode eCommerce Product Catalog allows Reflected XSS.This issue affects eCommerce Product Catalog: from n/a through...

7.1CVSS

7.1AI Score

0.0004EPSS

2024-04-18 10:08 AM
vulnrichment
vulnrichment

CVE-2024-32558 WordPress eCommerce Product Catalog plugin <= 3.3.32 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in impleCode eCommerce Product Catalog allows Reflected XSS.This issue affects eCommerce Product Catalog: from n/a through...

7.1CVSS

6.9AI Score

0.0004EPSS

2024-04-18 10:08 AM
cvelist
cvelist

CVE-2024-32335

TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in Access Control under the Wireless...

6AI Score

0.0004EPSS

2024-04-18 12:00 AM
openvas
openvas

Ubuntu: Security Advisory (USN-6726-3)

The remote host is missing an update for...

7.8CVSS

7AI Score

EPSS

2024-04-18 12:00 AM
9
nessus
nessus

Amazon Linux 2 : tigervnc (ALAS-2024-2510)

The version of tigervnc installed on the remote host is prior to 1.8.0-24. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2024-2510 advisory. A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function....

7.8CVSS

7.3AI Score

0.0005EPSS

2024-04-18 12:00 AM
12
cvelist
cvelist

CVE-2024-32334

TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in IP/Port Filtering under the Firewall...

6AI Score

0.0004EPSS

2024-04-18 12:00 AM
cvelist
cvelist

CVE-2024-32327

TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in Port Forwarding under the Firewall...

6AI Score

0.0004EPSS

2024-04-18 12:00 AM
cvelist
cvelist

CVE-2024-32332

TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in WDS Settings under the Wireless...

6AI Score

0.0004EPSS

2024-04-18 12:00 AM
nessus
nessus

Amazon Linux 2 : xorg-x11-server (ALAS-2024-2511)

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2024-2511 advisory. A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies,...

7.8CVSS

7.2AI Score

0.0005EPSS

2024-04-18 12:00 AM
6
cvelist
cvelist

CVE-2024-32333

TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in MAC Filtering under the Firewall...

6AI Score

0.0004EPSS

2024-04-18 12:00 AM
vulnrichment
vulnrichment

CVE-2024-32335

TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in Access Control under the Wireless...

6AI Score

0.0004EPSS

2024-04-18 12:00 AM
googleprojectzero
googleprojectzero

The Windows Registry Adventure #2: A brief history of the feature

Posted by Mateusz Jurczyk, Google Project Zero Before diving into the low-level security aspects of the registry, it is important to understand its role in the operating system and a bit of history behind it. In essence, the registry is a hierarchical database made of named "keys" and "values",...

6.3AI Score

2024-04-18 12:00 AM
4
cve
cve

CVE-2024-29952

A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow an authenticated user to print the Auth, Priv, and SSL key store passwords in unencrypted logs by manipulating command...

5.5CVSS

6.6AI Score

0.0004EPSS

2024-04-17 10:15 PM
33
nvd
nvd

CVE-2024-29952

A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow an authenticated user to print the Auth, Priv, and SSL key store passwords in unencrypted logs by manipulating command...

5.5CVSS

5.5AI Score

0.0004EPSS

2024-04-17 10:15 PM
vulnrichment
vulnrichment

CVE-2024-29952 Clear text storage of sensistive information by manipulating command variables

A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow an authenticated user to print the Auth, Priv, and SSL key store passwords in unencrypted logs by manipulating command...

5.5CVSS

6.8AI Score

0.0004EPSS

2024-04-17 09:43 PM
cvelist
cvelist

CVE-2024-29952 Clear text storage of sensistive information by manipulating command variables

A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow an authenticated user to print the Auth, Priv, and SSL key store passwords in unencrypted logs by manipulating command...

5.5CVSS

5.7AI Score

0.0004EPSS

2024-04-17 09:43 PM
redhatcve
redhatcve

CVE-2024-26890

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: fix out of bounds memory access The problem is detected by KASAN. btrtl driver uses private hci data to store 'struct btrealtek_data'. If btrtl driver is used with btusb, then memory for private hci data is...

6.9AI Score

0.0004EPSS

2024-04-17 06:28 PM
5
osv
osv

linux-xilinx-zynqmp vulnerabilities

Pratyush Yadav discovered that the Xen network backend implementation in the Linux kernel did not properly handle zero length data request, leading to a null pointer dereference vulnerability. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash)....

7.8CVSS

7.6AI Score

EPSS

2024-04-17 01:06 PM
11
debiancve
debiancve

CVE-2024-26890

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: fix out of bounds memory access The problem is detected by KASAN. btrtl driver uses private hci data to store 'struct btrealtek_data'. If btrtl driver is used with btusb, then memory for private hci data is...

6.6AI Score

0.0004EPSS

2024-04-17 11:15 AM
5
cve
cve

CVE-2024-26890

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: fix out of bounds memory access The problem is detected by KASAN. btrtl driver uses private hci data to store 'struct btrealtek_data'. If btrtl driver is used with btusb, then memory for private hci data is...

6.6AI Score

0.0004EPSS

2024-04-17 11:15 AM
51
nvd
nvd

CVE-2024-26890

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: fix out of bounds memory access The problem is detected by KASAN. btrtl driver uses private hci data to store 'struct btrealtek_data'. If btrtl driver is used with btusb, then memory for private hci data is...

7.4AI Score

0.0004EPSS

2024-04-17 11:15 AM
cvelist
cvelist

CVE-2024-26890 Bluetooth: btrtl: fix out of bounds memory access

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: fix out of bounds memory access The problem is detected by KASAN. btrtl driver uses private hci data to store 'struct btrealtek_data'. If btrtl driver is used with btusb, then memory for private hci data is...

6.7AI Score

0.0004EPSS

2024-04-17 10:27 AM
nvd
nvd

CVE-2024-32522

Missing Authorization vulnerability in Jaed Mosharraf & Pluginbazar Team Open Close WooCommerce Store.This issue affects Open Close WooCommerce Store: from n/a through...

4.3CVSS

4.7AI Score

0.0004EPSS

2024-04-17 08:15 AM
cve
cve

CVE-2024-32522

Missing Authorization vulnerability in Jaed Mosharraf & Pluginbazar Team Open Close WooCommerce Store.This issue affects Open Close WooCommerce Store: from n/a through...

4.3CVSS

6.8AI Score

0.0004EPSS

2024-04-17 08:15 AM
37
cvelist
cvelist

CVE-2024-32522 WordPress Open Close WooCommerce Store plugin <= 4.9.1 - Broken Access Control vulnerability

Missing Authorization vulnerability in Jaed Mosharraf & Pluginbazar Team Open Close WooCommerce Store.This issue affects Open Close WooCommerce Store: from n/a through...

4.3CVSS

5AI Score

0.0004EPSS

2024-04-17 07:31 AM
wpvulndb
wpvulndb

eCommerce Product Catalog < 3.3.29 - Cross-Site Request Forgery

Description The eCommerce Product Catalog plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.3.28. This is due to missing or incorrect nonce validation on the handle_mode() function. This makes it possible for unauthenticated attackers to change...

4.3CVSS

6.4AI Score

0.0004EPSS

2024-04-17 12:00 AM
6
openvas
openvas

Ubuntu: Security Advisory (USN-6726-2)

The remote host is missing an update for...

7.8CVSS

7AI Score

EPSS

2024-04-17 12:00 AM
8
nessus
nessus

Amazon Linux AMI : tigervnc (ALAS-2024-1927)

The version of tigervnc installed on the remote host is prior to 1.8.0-21.36. It is, therefore, affected by a vulnerability as referenced in the ALAS-2024-1927 advisory. A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when...

7.8CVSS

7.3AI Score

0.0004EPSS

2024-04-17 12:00 AM
10
ubuntucve
ubuntucve

CVE-2024-26890

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: fix out of bounds memory access The problem is detected by KASAN. btrtl driver uses private hci data to store 'struct btrealtek_data'. If btrtl driver is used with btusb, then memory for private hci data is...

6.6AI Score

0.0004EPSS

2024-04-17 12:00 AM
3
wpvulndb
wpvulndb

Essential Addons for Elementor < 5.9.15 - Contributor+ Store XSS via Widget URL

Description The plugin is vulnerable to Stored Cross-Site Scripting via the URL attributes of widgets due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject...

6.4CVSS

5.8AI Score

0.0004EPSS

2024-04-17 12:00 AM
2
wpvulndb
wpvulndb

WP EasyCart < 5.6.0 - Cross-Site Request Forgery

Description The Shopping Cart & eCommerce Store plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.5.19. This is due to missing or incorrect nonce validation on an unknown function. This makes it possible for unauthenticated attackers to...

5.4CVSS

6.5AI Score

0.0004EPSS

2024-04-17 12:00 AM
4
ubuntu
ubuntu

Linux kernel (Xilinx ZynqMP) vulnerabilities

Releases Ubuntu 20.04 LTS Packages linux-xilinx-zynqmp - Linux kernel for Xilinx ZynqMP processors Details Pratyush Yadav discovered that the Xen network backend implementation in the Linux kernel did not properly handle zero length data request, leading to a null pointer dereference...

7.8CVSS

7.5AI Score

EPSS

2024-04-17 12:00 AM
14
broadcom
broadcom

plaintext passwords storage in logs by manipulating command variables (CVE-2024-29952)

A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow an authenticated user to print the Auth, Priv, and SSL key store passwords in unencrypted logs by manipulating command...

6.6AI Score

0.0004EPSS

2024-04-17 12:00 AM
4
nessus
nessus

Amazon Linux AMI : xorg-x11-server (ALAS-2024-1928)

It is, therefore, affected by a vulnerability as referenced in the ALAS-2024-1928 advisory. A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server,...

7.8CVSS

7.2AI Score

0.0004EPSS

2024-04-17 12:00 AM
7
zdt
zdt

pgAdmin 8.3 Remote Code Execution Exploit

pgAdmin versions 8.3 and below have a path traversal vulnerability within their session management logic that can allow a pickled file to be loaded from an arbitrary location. This can be used to load a malicious, serialized Python object to execute code within the context of the target...

9.9CVSS

7.6AI Score

0.002EPSS

2024-04-17 12:00 AM
64
packetstorm

9.9CVSS

7.4AI Score

0.002EPSS

2024-04-17 12:00 AM
80
nessus
nessus

Amazon Linux 2023 : xorg-x11-server-common, xorg-x11-server-devel, xorg-x11-server-source (ALAS2023-2024-583)

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2024-583 advisory. A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies,...

7.8CVSS

7.5AI Score

0.0005EPSS

2024-04-17 12:00 AM
9
osv
osv

linux-iot vulnerabilities

Pratyush Yadav discovered that the Xen network backend implementation in the Linux kernel did not properly handle zero length data request, leading to a null pointer dereference vulnerability. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash)....

7.8CVSS

8.1AI Score

EPSS

2024-04-16 09:25 PM
9
githubexploit
githubexploit

Exploit for Command Injection in Paloaltonetworks Pan-Os

CVE-2024-3400 RCE Test Script Overview This Python...

10CVSS

10AI Score

0.957EPSS

2024-04-16 05:08 PM
84
rapid7blog
rapid7blog

Rapid7 Insight Platform Achieves Level 2 TX-Ramp Authorization

Authored by Damon Cabanillas Rapid7's Insight Platform has officially achieved Level 2 Texas Risk and Authorization Management Program (TX-RAMP) authorization. This milestone marks a significant step forward in providing our customers peace-of-mind as well as the best end-to-end cloud security...

7.3AI Score

2024-04-16 04:21 PM
6
thn
thn

AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud can expose sensitive credentials in build logs, posing significant risks to organizations. The vulnerability has been codenamed LeakyCLI by cloud security firm Orca. "Some...

8.6CVSS

7.1AI Score

0.001EPSS

2024-04-16 01:26 PM
13
malwarebytes
malwarebytes

Giant Tiger breach sees 2.8 million records leaked

Someone has posted a database of over 2.8 million records to a hacker forum, claiming they originated from a March 2024 hack at Canadian retail chain Giant Tiger. When asked, they posted a small snippet as proof. The download of the full database is practically free for other active members of...

7.2AI Score

2024-04-16 01:07 PM
14
kitploit
kitploit

NoArgs - Tool Designed To Dynamically Spoof And Conceal Process Arguments While Staying Undetected

NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly. Default Cmd:...

7.6AI Score

2024-04-16 12:30 PM
17
Total number of security vulnerabilities61353