2024-09-26 | CVE-2024-47130 | Missing Authentication for Critical Function vulnerability in Gotenna PRO The goTenna Pro App allows unauthenticated attackers to remotely update the local public keys used for P2P and group messages. | 6.5 |
2024-09-26 | CVE-2024-47169 | Path Traversal: '.../...//' vulnerability in Agnai Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. | 8.8 |
2024-09-26 | CVE-2024-47170 | Path Traversal vulnerability in Agnai Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. | 4.3 |
2024-09-26 | CVE-2024-47171 | Path Traversal vulnerability in Agnai Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. | 4.3 |
2024-09-26 | CVE-2024-37125 | Unspecified vulnerability in Dell Smartfabric Os10 10.5.3.0/10.5.3.4/10.5.3.5 Dell SmartFabric OS10 Software, versions 10.5.6.x, 10.5.5.x, 10.5.4.x,10.5.3.x, contains an Uncontrolled Resource Consumption vulnerability. network low complexity dell | 7.5 |
2024-09-26 | CVE-2024-43191 | IBM ManageIQ could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted yaml file request. | 7.2 |
2024-09-26 | CVE-2024-7259 | A flaw was found in oVirt. | 4.4 |
2024-09-26 | CVE-2024-8771 | The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'preview_email_template_design' function in all versions up to, and including, 5.7.34. | 4.3 |
2024-09-26 | CVE-2023-46175 | IBM Cloud Pak for Multicloud Management 2.3 through 2.3 FP8 stores user credentials in a log file plain clear text which can be read by a privileged user. | 4.4 |
2024-09-26 | CVE-2024-31899 | Insufficiently Protected Credentials vulnerability in IBM Cognos Command Center 10.2.4.1/10.2.5 IBM Cognos Command Center 10.2.4.1 and 10.2.5 could disclose highly sensitive user information to an authenticated user with physical access to the device. | 4.3 |