Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2024-10-10 CVE-2024-9522 Missing Authentication for Critical Function vulnerability in Lagunaisw WP Users Masquerade
The WP Users Masquerade plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.0.
network
low complexity
lagunaisw CWE-306
8.8
2024-10-10 CVE-2024-9581 Code Injection vulnerability in Happyplugins Shortcodes Anywhere
The Shortcodes AnyWhere plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0.1.
network
low complexity
happyplugins CWE-94
7.3
2024-10-09 CVE-2024-39515 An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS).
network
low complexity
CWE-1288
7.5
2024-10-09 CVE-2024-39516 An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS).
network
low complexity
CWE-125
7.5
2024-10-09 CVE-2024-39525 An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems with BGP traceoptions enabled and requires a BGP session to be already established.  Systems without BGP traceoptions enabled are not affected by this issue. This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability. This issue affects: Junos OS:  * All versions before 21.2R3-S8,  * from 21.4 before 21.4R3-S8,  * from 22.2 before 22.2R3-S4,  * from 22.3 before 22.3R3-S4, * from 22.4 before 22.4R3-S3,  * from 23.2 before 23.2R2-S1,  * from 23.4 before 23.4R2;  Junos OS Evolved:  * All versions before 21.2R3-S8-EVO,  * from 21.4-EVO before 21.4R3-S8-EVO,  * from 22.2-EVO before 22.2R3-S4-EVO,  * from 22.3-EVO before 22.3R3-S4-EVO, * from 22.4-EVO before 22.4R3-S3-EVO,  * from 23.2-EVO before 23.2R2-S1-EVO,  * from 23.4-EVO before 23.4R2-EVO.
network
low complexity
CWE-755
7.5
2024-10-09 CVE-2024-43610 Unspecified vulnerability in Microsoft Copilot Studio
Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector
network
low complexity
microsoft
7.5
2024-10-09 CVE-2024-46307 Unspecified vulnerability in Sparkshop
A loop hole in the payment logic of Sparkshop v1.16 allows attackers to arbitrarily modify the number of products.
network
low complexity
sparkshop
7.5
2024-10-09 CVE-2024-9463 OS Command Injection vulnerability in Paloaltonetworks Expedition
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
network
low complexity
paloaltonetworks CWE-78
7.5
2024-10-09 CVE-2024-9473 Unspecified vulnerability in Paloaltonetworks Globalprotect
A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect.
local
low complexity
paloaltonetworks
7.8
2024-10-09 CVE-2024-45136 Unrestricted Upload of File with Dangerous Type vulnerability in Adobe Incopy
InCopy versions 19.4, 18.5.3 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution by an attacker.
local
low complexity
adobe CWE-434
7.8