Latest high severity Vulnerabilities

## Description Starship is a cross-shell prompt. Starting in version 1.0.0 and prior to version 1.20.0, undocumented and unpredictable shell expansion and/or quoting rules make it easily to accidenta...
rust/starship>=1.0.0<=1.19.0
Starship vulnerable to shell injection via undocumented, unpredictable shell expansion in custom commands
rust/starship>=1.0.0<=1.19.0
streamlit-geospatial blind SSRF in pages/9_πŸ”²_Vector_Data_Visualization.py
streamlit-geospatial remote code execution in pages/8_🏜️_Raster_Data_Visualization.py
streamlit-geospatial blind SSRF in pages/7_πŸ“¦_Web_Map_Service.py
Remote code execution in streamlit geospatial in pages/10_🌍_Earth_Engine_Datasets.py
Remote code execution in streamlit geospatial in pages/1_πŸ“·_Timelapse.py MODIS Ocean Color SMI option vis_params
Remote code execution in streamlit geospatial in pages/1_πŸ“·_Timelapse.py MODIS Ocean Color SMI option palette
Remote code execution in streamlit geospatial in pages/1_πŸ“·_Timelapse.py MODIS Gap filled Land Surface Temperature Daily option
Remote code execution in streamlit geospatial in pages/1_πŸ“·_Timelapse.py Any Earth Engine ImageCollection option vis_params
Remote code execution in streamlit geospatial in pages/1_πŸ“·_Timelapse.py Any Earth Engine ImageCollection option palette
A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.
A privilege escalation vulnerability was discovered in an upload processing functionality of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via sp...
A privilege escalation vulnerability was discovered in the SSH captive command shell interface that could allow an authenticated XCC user with elevated privileges to perform command injection via spec...
A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to execute arbitrary code via a specially crafted IPMI command.
A privilege escalation vulnerability was discovered in the web interface or SSH captive command shell interface of XCC that could allow an authenticated XCC user with elevated privileges to perform co...
ChurchCRM SQL Injection Vulnerability
txtdot SSRF vulnerability in /proxy
txtdot SSRF vulnerability in /get
Improper Authentication vulnerability in OpenText OpenText Directory Services may allow Multi-factor Authentication Bypass in particular scenarios.This issue affects OpenText Directory Services: 24.2.
PayPal Official Module for PrestaShop has Improperly Implemented Security Check for Standard
Incorrect Access Control Vulnerability
Insecure Storage of Sensitive Information Vulnerability
Default Credential Storage in Plaintext Vulnerability
Cleartext Storage of Sensitive Information Vulnerability
Cleartext Transmission of Sensitive Information Vulnerability
Password Policy Bypass Vulnerability
Local Privilege Escalation in Nimble Commander <= v1.6.0, Build 4087
Important: Errata Advisory for Red Hat OpenShift GitOps v1.13.1 security update
Red Hat Red Hat OpenShift GitOps for IBM Power, little endian
Red Hat Red Hat OpenShift GitOps for ARM 64
Red Hat Red Hat OpenShift GitOps
Red Hat Red Hat OpenShift GitOps for IBM Z and LinuxONE
Softaculous Webuzo Password Reset Command Injection
Softaculous Webuzo FTP Management Command Injection
Softaculous Webuzo Authentication Bypass
OpenObserve Cross-site Scripting (XSS) vulnerability in `openobserve/web/src/views/MemberSubscription.vue`
OpenObserve stored XSS vulnerability may lead to complete account takeover
Elevation of privilege in Absolute Secure Access clients and servers
Authentication Bypass Using an Alternate Path or Channel in Positron Broadcast Signal Processor TRA7005
ForIP Tecnologia Administração PABX Authentication Form login sql injection
OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its us...
maven/org.openidentityplatform.openam:openam-oauth2<=15.0.3
In Spring Cloud Data Flow versions prior to 2.11.4,Β Β a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file s...
maven/org.springframework.cloud:spring-cloud-skipper<2.11.4
Memory request logic vulnerability in the memory module. Impact: Successful exploitation of this vulnerability will affect integrity and availability.
Huawei Emui=14.0.0
Huawei Harmonyos=4.0.0
Huawei Harmonyos=4.2.0
Access control vulnerability in the security verification module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Huawei Emui=14.0.0
Huawei Harmonyos=4.0.0
Huawei Harmonyos=4.2.0
Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Huawei Emui=12.0.0
Huawei Emui=13.0.0
Huawei Emui=14.0.0
Huawei Harmonyos=2.0.0
Huawei Harmonyos=2.1.0
Huawei Harmonyos=3.0.0
and 3 more
LearnPress <= 4.2.6.8.2 - Authenticated (Contributor+) Local File Inclusion
Remote code execution in Spring Cloud Data Flow
maven/org.springframework.cloud:spring-cloud-skipper<2.11.4
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Microsoft Edge<127.0.2651.74
Microsoft Edge (Chromium-based)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab
Important: httpd security update
Red Hat Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions
Red Hat Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates
Red Hat Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions
Red Hat Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates
redhat/httpd<2.4.51-7.el9_0.7
redhat/httpd<2.4.51-7.el9_0.7
and 24 more
A stored XSS issue was discovered in Archer Platform 6 before version 2024.06. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in...

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
Β© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203