CVE-2024-57436

CVSS v3 Score
7.2
High

Vulnerability Description

RuoYi v4.8.0 was discovered to allow unauthorized attackers to view the session ID of the admin in the system monitoring. This issue can allow attackers to impersonate Admin users via using a crafted cookie.

CVSS:7.1(High)

Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally.

CVSS:7.5(High)

Redbrick Shift through 3.4.3 allows an attacker to extract authentication tokens of services (such as Gmail, Outlook, etc.) used in the application.

CVSS:7.5(High)

Redbrick Shift through 3.4.3 allows an attacker to extract authentication tokens of services (such as Gmail, Outlook, etc.) used in the application.

CVSS:7.5(High)

MFScripts YetiShare v3.5.2 through v4.5.4 places sensitive information in the Referer header. If this leaks, then third parties may discover password-reset hashes, file-delete links, or other sensitiv...

CVSS:7.5(High)

An issue was discovered in Gradle Enterprise 2017.1 - 2020.2.4. The /usage page of Gradle Enterprise conveys high level build information such as project names and build counts over time. This page is...

CVSS:7.5(High)

In cPanel before 88.0.3, an insecure SRS secret is used on a templated VM (SEC-552).