CVE-2024-31465 – XWiki Platform: Remote code execution from account via SearchSuggestSourceSheet
https://notcve.org/view.php?id=CVE-2024-31465
Starting in version 5.0-rc-1 and prior to versions 14.10.20, 15.5.4, and 15.9-rc-1, any user with edit right on any page can execute any code on the server by adding an object of type `XWiki.SearchSuggestSourceClass` to their user profile or any other page. • https://github.com/xwiki/xwiki-platform/commit/0317a3aa78065e66c86fc725976b06bf7f9b446e https://github.com/xwiki/xwiki-platform/commit/2740974c32dbb7cc565546d0f04e2374b32b36f7 https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809 https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809#diff-67b473d2b6397d65b7726c6a13555850b11b10128321adf9e627e656e1d130a5 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-34fj-r5gq-7395 https://jira.xwiki.org/browse/XWIKI-21474 • CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •
CVE-2024-31214 – Traccar's unrestricted file upload vulnerability in device image upload could lead to remote code execution
https://notcve.org/view.php?id=CVE-2024-31214
This can potentially lead to remote code execution, XSS, DOS, etc. • https://github.com/traccar/traccar/blob/master/src/main/java/org/traccar/model/Device.java#L56 https://github.com/traccar/traccar/blob/v5.12/src/main/java/org/traccar/api/resource/DeviceResource.java#L191 https://github.com/traccar/traccar/commit/3fbdcd81566bc72e319ec05c77cf8a4120b87b8f https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2024-2195 – Remote Code Execution in aimhubio/aim
https://notcve.org/view.php?id=CVE-2024-2195
A critical Remote Code Execution (RCE) vulnerability was identified in the aimhubio/aim project, specifically within the `/api/runs/search/run/` endpoint, affecting versions >= 3.0.0. The vulnerability resides in the `run_search_api` function of the `aim/web/api/runs/views.py` file, where improper restriction of user access to the `RunView` object allows for the execution of arbitrary code via the `query` parameter. • https://huntr.com/bounties/22f2355e-b875-4c01-b454-327e5951c018 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-1602 – Stored XSS leading to RCE in parisneo/lollms-webui
https://notcve.org/view.php?id=CVE-2024-1602
parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model output data, allowing an attacker to inject malicious JavaScript code. This code can be executed within the user's browser context, enabling the attacker to send a request to the `/execute_code` endpoint and establish a reverse shell to the attacker's host. • https://huntr.com/bounties/59be0d5a-f18e-4418-8f29-72320269a097 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-2221 – Path Traversal and Arbitrary File Upload Vulnerability in qdrant/qdrant
https://notcve.org/view.php?id=CVE-2024-2221
This vulnerability allows attackers to upload and overwrite any file on the filesystem, leading to potential remote code execution. • https://github.com/qdrant/qdrant/commit/e6411907f0ecf3c2f8ba44ab704b9e4597d9705d https://huntr.com/bounties/6be8d4e3-67e6-4660-a8db-04215a1cff3e • CWE-434: Unrestricted Upload of File with Dangerous Type •