Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-10-18 | CVE-2024-10130 | Stack-based Buffer Overflow vulnerability in Tenda AC8 Firmware 16.03.34.06 A vulnerability classified as critical was found in Tenda AC8 16.03.34.06. | 8.8 |
2024-10-18 | CVE-2024-10123 | Stack-based Buffer Overflow vulnerability in Tenda AC8 Firmware 16.03.34.06 A vulnerability was found in Tenda AC8 16.03.34.06. | 8.8 |
2024-10-18 | CVE-2024-9593 | Code Injection vulnerability in Wpplugin Time Clock The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. | 8.3 |
2024-10-18 | CVE-2023-6080 | Unspecified vulnerability in Lakesidesoftware Systrack Lsiagent Lakeside Software’s SysTrack LsiAgent Installer version 10.7.8 for Windows contains a local privilege escalation vulnerability which allows attackers SYSTEM level access. | 7.8 |
2024-10-18 | CVE-2024-47241 | Improper Certificate Validation vulnerability in Dell Secure Connect Gateway 5.24.00.14 Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains an Improper Certificate Validation vulnerability. | 8.1 |
2024-10-18 | CVE-2024-48016 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Secure Connect Gateway 5.24.00.14 Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. | 8.8 |
2024-10-18 | CVE-2024-49243 | Inclusion of Functionality from Untrusted Control Sphere vulnerability in Jonvincentmendoza Dynamic Elementor Addons Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Jon Vincent Mendoza Dynamic Elementor Addons allows PHP Local File Inclusion.This issue affects Dynamic Elementor Addons: from n/a through 1.0.0. | 8.8 |
2024-10-18 | CVE-2023-49570 | Improper Certificate Validation vulnerability in Bitdefender Total Security A vulnerability has been identified in Bitdefender Total Security HTTPS scanning functionality where the software trusts a certificate issued by an entity that isn't authorized to issue certificates. | 7.4 |
2024-10-18 | CVE-2024-47487 | SQL Injection vulnerability in Hikvision Hikcentral Professional 2.0.0/2.5.1 There is a SQL injection vulnerability in some HikCentral Professional versions. | 8.8 |
2024-10-18 | CVE-2024-4739 | Unspecified vulnerability in Moxa Mxsecurity 1.0/1.0.1/1.1.0 The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. | 7.5 |