AnyDesk version 9.0.1 installs a service with an unquoted service path that runs with SYSTEM privileges. This vulnerability could allow a local user with lower privileges to execute arbitrary code with elevated privileges on the system.
The ABB Cylon Aspect version 3.08.01 and below is vulnerable to remote code execution. The issue arises due to the improper handling of user input in the uploadFile() function of bigUpload.php. This vulnerability allows an attacker to upload malicious files to arbitrary locations on the server, leading to arbitrary code execution. An authenticated attacker can exploit this to gain unauthorized access to the building controller.
The Daikin Security Gateway 214 is vulnerable to an IDOR flaw in its password reset API endpoint. An attacker can exploit this vulnerability by sending a crafted POST request, bypassing authentication mechanisms. Successful exploitation results in resetting the system credentials to the default Daikin:Daikin username and password combination, granting unauthorized access to the system and potentially compromising connected devices and networks.
The Hugging Face Transformers MobileViTV2 version 4.41.1 is vulnerable to Remote Code Execution (RCE) through a maliciously crafted YAML configuration file. By deserializing this configuration file using the convert_mlcvnets_to_pytorch.py script, an attacker can execute arbitrary code on the target system. This exploit has been assigned the CVE-2024-11392.
Gitea version 1.24.0 is susceptible to HTML Injection and potentially Reflected Cross-Site Scripting (XSS) through the 'description' parameter on the user settings page. The lack of proper sanitization of user-supplied HTML content allows malicious scripts to be executed in the user's browser, leading to potential attacks. An attacker can inject malicious HTML or JavaScript code into their profile description, which gets executed when saved, demonstrating the presence of the vulnerability.
KubeSphere 3.4.0 allows unauthorized users to access sensitive information, such as cluster and node details, users' information, without being registered to any workspace or cluster. This vulnerability exists in versions [>= 4.0.0 & < 4.1.3] and [>= 3.0.0 & < 3.4.1]. An attacker can exploit this flaw to gain unauthorized access to various endpoints like cluster overview, node details, and project information.
DataEase 2.4.0 to 2.5.0 allows remote attackers to obtain sensitive information via a crafted request to /de2api/engine/getEngine;.js, which results in the disclosure of database configuration details such as username, password, and port.
The Ethercreative Logs plugin for Craft CMS 3.0.3 allows authenticated users to perform a path traversal attack via the 'Logs' functionality. This vulnerability (CVE-2022-23409) enables an attacker to access arbitrary files on the file system with the permissions of the web service user by manipulating the requested log file.
A critical buffer overflow and memory corruption vulnerability was found in the FTP server implementation of TP-Link VN020-F3v(T) router due to improper input validation of the USER command. Attackers can exploit this issue to manipulate payload size and trigger various failure modes, including delayed crash, immediate crash, and undefined behavior.
Teedy 1.11 is vulnerable to an XSS exploit that could enable a malicious Teedy administrator to take over an account by manipulating certain requests. By uploading a specially crafted HTML file and modifying the 'Origin' and 'Referer' headers during the fetch request, an attacker can execute arbitrary scripts in the context of the user's session, leading to an account takeover.