2024-07-12 | CVE-2024-40518 | Seacms | Unspecified vulnerability in Seacms 12.9 SeaCMS 12.9 has a remote code execution vulnerability. | 8.8 |
2024-07-12 | CVE-2024-40519 | Seacms | Unspecified vulnerability in Seacms 12.9 SeaCMS 12.9 has a remote code execution vulnerability. | 8.8 |
2024-07-12 | CVE-2024-40520 | Seacms | Unspecified vulnerability in Seacms 12.9 SeaCMS 12.9 has a remote code execution vulnerability. | 8.8 |
2024-07-12 | CVE-2024-40521 | Seacms | Unspecified vulnerability in Seacms 12.9 SeaCMS 12.9 has a remote code execution vulnerability. | 8.8 |
2024-07-12 | CVE-2024-40522 | Seacms | Unspecified vulnerability in Seacms 12.9 There is a remote code execution vulnerability in SeaCMS 12.9. | 8.8 |
2024-07-12 | CVE-2024-40543 | Publiccms | Server-Side Request Forgery (SSRF) vulnerability in Publiccms PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/ueditor?action=catchimage. | 8.8 |
2024-07-12 | CVE-2024-40544 | Publiccms | Server-Side Request Forgery (SSRF) vulnerability in Publiccms PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/#maintenance_sysTask/edit. | 8.8 |
2024-07-12 | CVE-2024-40545 | Publiccms | Unrestricted Upload of File with Dangerous Type vulnerability in Publiccms An arbitrary file upload vulnerability in the component /admin/cmsWebFile/doUpload of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. | 8.8 |
2024-07-12 | CVE-2024-40546 | Publiccms | Unrestricted Upload of File with Dangerous Type vulnerability in Publiccms An arbitrary file upload vulnerability in the component /admin/cmsWebFile/save of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. | 8.8 |
2024-07-12 | CVE-2024-40548 | Publiccms | Unrestricted Upload of File with Dangerous Type vulnerability in Publiccms An arbitrary file upload vulnerability in the component /admin/cmsTemplate/save of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. | 8.8 |
2024-07-12 | CVE-2024-40549 | Publiccms | Unrestricted Upload of File with Dangerous Type vulnerability in Publiccms An arbitrary file upload vulnerability in the component /admin/cmsTemplate/savePlace of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. | 8.8 |
2024-07-12 | CVE-2024-40550 | Publiccms | Unrestricted Upload of File with Dangerous Type vulnerability in Publiccms An arbitrary file upload vulnerability in the component /admin/cmsTemplate/savePlaceMetaData of Public CMS v.4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. | 8.8 |
2024-07-12 | CVE-2024-40551 | Publiccms | Unrestricted Upload of File with Dangerous Type vulnerability in Publiccms An arbitrary file upload vulnerability in the component /admin/cmsTemplate/doUpload of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. | 8.8 |
2024-07-12 | CVE-2024-40552 | Publiccms | Unspecified vulnerability in Publiccms PublicCMS v4.0.202302.e was discovered to contain a remote commande execution (RCE) vulnerability via the cmdarray parameter at /site/ScriptComponent.java. | 8.8 |
2024-07-12 | CVE-2024-6353 | | The Wallet for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'search[value]' parameter in all versions up to, and including, 1.5.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 8.8 |
2024-07-11 | CVE-2024-6666 | Wedevs | SQL Injection vulnerability in Wedevs WP ERP The WP ERP plugin for WordPress is vulnerable to SQL Injection via the ‘vendor_id’ parameter in all versions up to, and including, 1.13.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 8.8 |
2024-07-11 | CVE-2024-1845 | E4Jconnect | Cross-Site Request Forgery (CSRF) vulnerability in E4Jconnect Vikrentcar The VikRentCar Car Rental Management System WordPress plugin before 1.3.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks | 8.8 |
2024-07-10 | CVE-2024-39565 | | An Improper Neutralization of Data within XPath Expressions ('XPath Injection') vulnerability in J-Web shipped with Juniper Networks Junos OS allows an unauthenticated, network-based attacker to execute remote commands on the target device. While an administrator is logged into a J-Web session or has previously logged in and subsequently logged out of their J-Web session, the attacker can arbitrarily execute commands on the target device with the other user's credentials. | 8.8 |
2024-07-10 | CVE-2024-6411 | | The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.8.9. | 8.8 |
2024-07-10 | CVE-2023-7061 | | The Advanced File Manager Shortcodes plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 2.5.3. | 8.8 |
2024-07-10 | CVE-2023-7062 | | The Advanced File Manager Shortcodes plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4. | 8.8 |
2024-07-10 | CVE-2024-5792 | | The Houzez CRM plugin for WordPress is vulnerable to time-based SQL Injection via the notes ‘belong_to’ parameter in all versions up to, and including, 1.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 8.8 |
2024-07-10 | CVE-2024-21417 | | Windows Text Services Framework Elevation of Privilege Vulnerability | 8.8 |
2024-07-09 | CVE-2024-40034 | Idccms Project | Cross-Site Request Forgery (CSRF) vulnerability in Idccms Project Idccms 1.35 idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userLevel_deal.php?mudi=del | 8.8 |
2024-07-09 | CVE-2024-40037 | Idccms Project | Cross-Site Request Forgery (CSRF) vulnerability in Idccms Project Idccms 1.35 idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userScore_deal.php?mudi=del | 8.8 |
2024-07-09 | CVE-2024-40039 | Idccms Project | Cross-Site Request Forgery (CSRF) vulnerability in Idccms Project Idccms 1.35 idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userGroup_deal.php?mudi=del | 8.8 |
2024-07-09 | CVE-2024-20701 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21303 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21308 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21317 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21331 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21332 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21333 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21335 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21373 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21398 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21414 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21415 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21425 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21428 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-21449 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-28899 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.8 |
2024-07-09 | CVE-2024-28928 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-30013 | Microsoft | Unspecified vulnerability in Microsoft products Windows MultiPoint Services Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-35256 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-35271 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-35272 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37318 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37319 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37320 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37321 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37322 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37323 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37324 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37326 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37327 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37328 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37329 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37330 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37331 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37332 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37333 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37334 | | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-37336 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-38021 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Outlook Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-38053 | Microsoft | Use After Free vulnerability in Microsoft products Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-38060 | Microsoft | Out-of-bounds Write vulnerability in Microsoft products Windows Imaging Component Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-38087 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-38088 | | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-38092 | Microsoft | Unspecified vulnerability in Microsoft Azure Cyclecloud Azure CycleCloud Elevation of Privilege Vulnerability | 8.8 |
2024-07-09 | CVE-2024-38104 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products Windows Fax Service Remote Code Execution Vulnerability | 8.8 |
2024-07-09 | CVE-2024-5456 | | The Panda Video plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.0 via the 'selected_button' parameter. | 8.8 |
2024-07-09 | CVE-2024-6069 | | The Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation/deactivation due to missing capability checks on the pieregister_install_addon, pieregister_activate_addon and pieregister_deactivate_addon functions in all versions up to, and including, 3.8.3.4. | 8.8 |
2024-07-09 | CVE-2024-6161 | | The Default Thumbnail Plus plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'get_cache_image' function in all versions up to, and including, 1.0.2.3. | 8.8 |
2024-07-09 | CVE-2024-6309 | | The Attachment File Icons (AF Icons) plugin for WordPress is vulnerable to Cross-Site Request Forgery to Arbitrary File Upload in versions up to, and including, 1.3. | 8.8 |
2024-07-09 | CVE-2024-6316 | | The Generate PDF using Contact Form 7 plugin for WordPress is vulnerable to Cross-Site Request Forgery to Arbitrary File Upload in versions up to, and including, 4.0.6. | 8.8 |
2024-07-09 | CVE-2024-6317 | | The Generate PDF using Contact Form 7 plugin for WordPress is vulnerable to Cross-Site Request Forgery to Arbitrary File Upload in versions up to, and including, 4.0.6. | 8.8 |
2024-07-09 | CVE-2024-6320 | | The ScrollTo Top plugin for WordPress is vulnerable to Cross-Site Request Forgery to Arbitrary File Upload in versions up to, and including, 1.2.2. | 8.8 |
2024-07-09 | CVE-2024-6321 | | The ScrollTo Bottom plugin for WordPress is vulnerable to Cross-Site Request Forgery to Arbitrary File Upload in versions up to, and including, 1.1.1. | 8.8 |
2024-07-09 | CVE-2024-5441 | Webnus | Unrestricted Upload of File with Dangerous Type vulnerability in Webnus Modern Events Calendar The Modern Events Calendar plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_featured_image function in all versions up to, and including, 7.11.0. | 8.8 |
2024-07-09 | CVE-2024-6166 | Unlimited Elements | SQL Injection vulnerability in Unlimited-Elements Unlimited Elements for Elementor (Free Widgets, Addons, Templates) The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to time-based SQL Injection via the ‘addons_order’ parameter in all versions up to, and including, 1.5.112 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 8.8 |
2024-07-09 | CVE-2024-5793 | | The Houzez Theme - Functionality plugin for WordPress is vulnerable to SQL Injection via the ‘currency_code’ parameter in all versions up to, and including, 3.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 8.8 |
2024-07-08 | CVE-2023-47677 | Realtek Level1 | Cross-Site Request Forgery (CSRF) vulnerability in multiple products A cross-site request forgery (csrf) vulnerability exists in the boa CSRF protection functionality of Realtek rtl819x Jungle SDK v3.4.11. | 8.8 |
2024-07-08 | CVE-2024-39202 | Dlink | Unspecified vulnerability in Dlink Dir-823X Ax3000 Firmware 240126 D-Link DIR-823X firmware - 240126 was discovered to contain a remote command execution (RCE) vulnerability via the dhcpd_startip parameter at /goform/set_lan_settings. | 8.8 |
2024-07-09 | CVE-2024-37984 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.4 |
2024-07-11 | CVE-2024-28872 | ISC | Improper Certificate Validation vulnerability in ISC Stork The TLS certificate validation code is flawed. | 8.1 |
2024-07-11 | CVE-2024-22280 | Vmware | SQL Injection vulnerability in VMWare Aria Automation and Cloud Foundation VMware Aria Automation does not apply correct input validation which allows for SQL-injection in the product. An authenticated malicious user could enter specially crafted SQL queries and perform unauthorised read/write operations in the database. | 8.1 |
2024-07-09 | CVE-2024-35264 | Microsoft | Unspecified vulnerability in Microsoft .Net and Visual Studio 2022 .NET and Visual Studio Remote Code Execution Vulnerability | 8.1 |
2024-07-09 | CVE-2024-38049 | Microsoft | Externally Controlled Reference to a Resource in Another Sphere vulnerability in Microsoft products Windows Distributed Transaction Coordinator Remote Code Execution Vulnerability | 8.1 |
2024-07-09 | CVE-2024-37969 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37970 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37971 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37972 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37974 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37975 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37977 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37978 | Microsoft | Unspecified vulnerability in Microsoft Windows 11 22H2 and Windows 11 23H2 Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37981 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37986 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37987 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37988 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-37989 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-38010 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-09 | CVE-2024-38011 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 8.0 |
2024-07-12 | CVE-2024-39494 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on rename and the earlier value can be freed; there are conditions sufficient to stabilize it (->d_lock on dentry, ->d_lock on its parent, ->i_rwsem exclusive on the parent's inode, rename_lock), but none of those are met at any of the sites. | 7.8 |
2024-07-12 | CVE-2024-39495 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: greybus: Fix use-after-free bug in gb_interface_release due to race condition. In gb_interface_create, &intf->mode_switch_completion is bound with gb_interface_mode_switch_work. | 7.8 |
2024-07-12 | CVE-2024-39496 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a zone's info during creation of a block group, we can race with a device replace operation and then trigger a use-after-free on the device that was just replaced (source device of the replace operation). This happens because at btrfs_load_zone_info() we extract a device from the chunk map into a local variable and then use the device while not under the protection of the device replace rwsem. | 7.8 |
2024-07-12 | CVE-2024-40902 | Linux | Classic Buffer Overflow vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: jfs: xattr: fix buffer overflow for invalid xattr When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. | 7.8 |
2024-07-12 | CVE-2024-40903 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps There could be a potential use-after-free case in tcpm_register_source_caps(). | 7.8 |
2024-07-11 | CVE-2024-39520 | | An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level. This issue affects Junos OS Evolved: * All version before 20.4R3-S6-EVO, * 21.2-EVO versions before 21.2R3-S4-EVO, * 21.4-EVO versions before 21.4R3-S6-EVO, * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO, * 22.3-EVO versions before 22.3R2-EVO. | 7.8 |
2024-07-11 | CVE-2024-39521 | | An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level. This issue affects Junos OS Evolved: * 21.1-EVO versions 21.1R1-EVO and later before 21.2R3-S8-EVO, * 21.4-EVO versions before 21.4R3-S7-EVO, * 22.1-EVO versions before 22.1R3-S6-EVO, * 22.2-EVO versions before 22.2R3-EVO, * 22.3-EVO versions before 22.3R2-EVO. | 7.8 |
2024-07-11 | CVE-2024-39522 | | An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level. This issue affects Junos OS Evolved: * 22.3-EVO versions before 22.3R2-EVO, * 22.4-EVO versions before 22.4R1-S1-EVO, 22.4R2-EVO. | 7.8 |
2024-07-11 | CVE-2024-39523 | | An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level. This issue affects Junos OS Evolved: * All versions before 20.4R3-S7-EVO, * 21.2-EVO versions before 21.2R3-S8-EVO, * 21.4-EVO versions before 21.4R3-S7-EVO, * 22.1-EVO versions before 22.1R3-S6-EVO, * 22.2-EVO versions before 22.2R3-EVO, * 22.3-EVO versions before 22.3R2-EVO, * 22.4-EVO versions before 22.4R2-EVO. | 7.8 |
2024-07-11 | CVE-2024-39524 | | An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level. This issue affects Junos OS Evolved: All versions before 20.4R3-S7-EVO, 21.2-EVO versions before 21.2R3-S8-EVO, 21.4-EVO versions before 21.4R3-S7-EVO, 22.2-EVO versions before 22.2R3-EVO, 22.3-EVO versions before 22.3R2-EVO, 22.4-EVO versions before 22.4R2-EVO. | 7.8 |
2024-07-11 | CVE-2024-2602 | Schneider Electric | Path Traversal vulnerability in Schneider-Electric Foxrtu Station CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could result in remote code execution when an authenticated user executes a saved project file that has been tampered by a malicious actor. | 7.8 |
2024-07-11 | CVE-2024-5681 | Schneider Electric | Improper Input Validation vulnerability in Schneider-Electric Ecostruxure Foxboro DCS Control Core Services CWE-20: Improper Input Validation vulnerability exists that could cause local denial-of-service, privilege escalation, and potentially kernel execution when a malicious actor with local user access crafts a script/program using an IOCTL call in the Foxboro.sys driver. | 7.8 |
2024-07-09 | CVE-2024-20781 | | InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-07-09 | CVE-2024-20783 | | InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-07-09 | CVE-2024-20785 | | InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-07-09 | CVE-2024-34139 | | Bridge versions 14.0.4, 13.0.7, 14.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-07-09 | CVE-2024-30079 | Microsoft | Unspecified vulnerability in Microsoft products Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-35261 | Microsoft | Unspecified vulnerability in Microsoft Azure Network Watcher Agent Azure Network Watcher VM Extension Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-37973 | Microsoft | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38034 | Microsoft | Unspecified vulnerability in Microsoft products Windows Filtering Platform Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38043 | Microsoft | Unspecified vulnerability in Microsoft products PowerShell Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38047 | Microsoft | Unspecified vulnerability in Microsoft products PowerShell Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38050 | Microsoft | Integer Underflow (Wrap or Wraparound) vulnerability in Microsoft products Windows Workstation Service Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38051 | Microsoft | Out-of-bounds Write vulnerability in Microsoft products Windows Graphics Component Remote Code Execution Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38052 | Microsoft | Unspecified vulnerability in Microsoft products Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38054 | Microsoft | Out-of-bounds Write vulnerability in Microsoft products Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38057 | Microsoft | Unspecified vulnerability in Microsoft products Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38059 | Microsoft | Unspecified vulnerability in Microsoft products Win32k Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38062 | Microsoft | Unspecified vulnerability in Microsoft products Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38066 | Microsoft | Use After Free vulnerability in Microsoft products Windows Win32k Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38070 | Microsoft | Unspecified vulnerability in Microsoft products Windows LockDown Policy (WLDP) Security Feature Bypass Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38079 | Microsoft | Unspecified vulnerability in Microsoft products Windows Graphics Component Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38080 | Microsoft | Unspecified vulnerability in Microsoft products Windows Hyper-V Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38085 | Microsoft | Unspecified vulnerability in Microsoft products Windows Graphics Component Elevation of Privilege Vulnerability | 7.8 |
2024-07-09 | CVE-2024-38100 | Microsoft | Unspecified vulnerability in Microsoft products Windows File Explorer Elevation of Privilege Vulnerability | 7.8 |
2024-07-08 | CVE-2024-27459 | Openvpn | Out-of-bounds Write vulnerability in Openvpn The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges. | 7.8 |
2024-07-08 | CVE-2024-37999 | Siemens | Unspecified vulnerability in Siemens Medicalis Workflow Orchestrator A vulnerability has been identified in Medicalis Workflow Orchestrator (All versions). | 7.8 |
2024-07-08 | CVE-2024-38330 | IBM | Uncontrolled Search Path Element vulnerability in IBM I 7.2/7.3/7.4 IBM System Management for i 7.2, 7.3, and 7.4 could allow a local user to gain elevated privileges due to an unqualified library program call. | 7.8 |
2024-07-09 | CVE-2024-35266 | Microsoft | Unspecified vulnerability in Microsoft Azure Devops Server 2022.1.0 Azure DevOps Server Spoofing Vulnerability | 7.6 |
2024-07-09 | CVE-2024-35267 | Microsoft | Unspecified vulnerability in Microsoft Azure Devops Server 2022.1.0 Azure DevOps Server Spoofing Vulnerability | 7.6 |
2024-07-11 | CVE-2024-39531 | | An Improper Handling of Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows a network-based, unauthenticated attacker to cause a Denial-of-Service (DoS). If a value is configured for DDoS bandwidth or burst parameters for any protocol in a queue, all protocols which share the same queue will have their bandwidth or burst value changed to the new value. | 7.5 |
2024-07-11 | CVE-2024-39540 | | An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage. This issue affects Junos OS: 21.2 releases from 21.2R3-S5 before 21.2R3-S6. This issue does not affect earlier or later releases. | 7.5 |
2024-07-11 | CVE-2024-39542 | | An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MPC10/11 or LC9600, MX304, and Junos OS Evolved on ACX Series and PTX Series allows an unauthenticated, network based attacker to cause a Denial-of-Service (DoS). This issue can occur in two scenarios: 1. | 7.5 |
2024-07-11 | CVE-2024-39548 | | An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to consume memory resources, resulting in a Denial of Service (DoS) condition. | 7.5 |
2024-07-11 | CVE-2024-39549 | | A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. | 7.5 |
2024-07-11 | CVE-2024-39551 | | An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (Application Layer Gateway) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 and MS-MPC/MIC, allows an unauthenticated network-based attacker to send specific packets causing traffic loss leading to Denial of Service (DoS). Continued receipt and processing of these specific packets will sustain the Denial of Service condition. The memory usage can be monitored using the below command. user@host> show usp memory segment sha data objcache jsf This issue affects SRX Series and MX Series with SPC3 and MS-MPC/MIC: * 20.4 before 20.4R3-S10, * 21.2 before 21.2R3-S6, * 21.3 before 21.3R3-S5, * 21.4 before 21.4R3-S6, * 22.1 before 22.1R3-S4, * 22.2 before 22.2R3-S2, * 22.3 before 22.3R3-S1, * 22.4 before 22.4R3, * 23.2 before 23.2R2. | 7.5 |
2024-07-11 | CVE-2024-39552 | | An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial of Service (DoS). When a malformed BGP UPDATE packet is received over an established BGP session, RPD crashes and restarts. Continuous receipt of the malformed BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices. This issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. | 7.5 |
2024-07-11 | CVE-2024-39529 | | A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If DNS Domain Generation Algorithm (DGA) detection or tunnel detection, and DNS-filtering traceoptions are configured, and specific valid transit DNS traffic is received this causes a PFE crash and restart, leading to a Denial of Service. This issue affects Junos OS: * All versions before 21.4R3-S6, * 22.2 versions before 22.2R3-S3, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R2. | 7.5 |
2024-07-11 | CVE-2024-37151 | Oisf | Improper Check for Unusual or Exceptional Conditions vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. | 7.5 |
2024-07-11 | CVE-2024-38534 | Oisf | Allocation of Resources Without Limits or Throttling vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. | 7.5 |
2024-07-11 | CVE-2024-38535 | Oisf | Allocation of Resources Without Limits or Throttling vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. | 7.5 |
2024-07-11 | CVE-2024-38536 | Oisf | NULL Pointer Dereference vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. | 7.5 |
2024-07-11 | CVE-2024-6407 | Schneider Electric | Unspecified vulnerability in Schneider-Electric Whc-5918A Firmware CWE-200: Information Exposure vulnerability exists that could cause disclosure of credentials when a specially crafted message is sent to the device. | 7.5 |
2024-07-10 | CVE-2024-39518 | | A Heap-based Buffer Overflow vulnerability in the telemetry sensor process (sensord) of Juniper Networks Junos OS on MX240, MX480, MX960 platforms using MPC10E causes a steady increase in memory utilization, ultimately leading to a Denial of Service (DoS). When the device is subscribed to a specific subscription on Junos Telemetry Interface, a slow memory leak occurs and eventually all resources are consumed and the device becomes unresponsive. | 7.5 |
2024-07-10 | CVE-2024-39555 | | An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resulting in a Denial of Service (DoS). | 7.5 |
2024-07-10 | CVE-2024-39562 | | A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible for spawning SSH daemon (sshd) instances, of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS) by blocking SSH access for legitimate users. | 7.5 |
2024-07-10 | CVE-2024-6421 | | An unauthenticated remote attacker can read out sensitive device information through a incorrectly configured FTP service. | 7.5 |
2024-07-09 | CVE-2024-27360 | Samsung | Improper Validation of Specified Quantity in Input vulnerability in Samsung products A vulnerability was discovered in Samsung Mobile Processors Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, and Exynos W930 where they do not properly check length of the data, which can lead to a Denial of Service. | 7.5 |
2024-07-09 | CVE-2024-27362 | Samsung | Improper Validation of Specified Quantity in Input vulnerability in Samsung products A vulnerability was discovered in Samsung Mobile Processors Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380, and Exynos 2400 where they do not properly check the length of the data, which can lead to a Information disclosure. | 7.5 |
2024-07-09 | CVE-2024-31957 | Samsung | Improper Validation of Specified Quantity in Input vulnerability in Samsung Exynos 2200 Firmware and Exynos 2400 Firmware A vulnerability was discovered in Samsung Mobile Processors Exynos 2200 and Exynos 2400 where they lack a check for the validation of native handles, which can result in a DoS(Denial of Service) attack by unmapping an invalid length. | 7.5 |
2024-07-09 | CVE-2024-39698 | Electron | Improper Certificate Validation vulnerability in Electron Electron-Builder electron-updater allows for automatic updates for Electron apps. | 7.5 |
2024-07-09 | CVE-2024-30098 | Microsoft | Unspecified vulnerability in Microsoft products Windows Cryptographic Services Security Feature Bypass Vulnerability | 7.5 |
2024-07-09 | CVE-2024-30105 | Microsoft | Unspecified vulnerability in Microsoft .Net and Visual Studio 2022 .NET Core and Visual Studio Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-32987 | Microsoft | Unspecified vulnerability in Microsoft Sharepoint Server 2016/2019 Microsoft SharePoint Server Information Disclosure Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38015 | Microsoft | Unspecified vulnerability in Microsoft products Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38031 | Microsoft | Unspecified vulnerability in Microsoft products Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38061 | Microsoft | Unspecified vulnerability in Microsoft products DCOM Remote Cross-Session Activation Elevation of Privilege Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38064 | Microsoft | Unspecified vulnerability in Microsoft products Windows TCP/IP Information Disclosure Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38067 | Microsoft | Unspecified vulnerability in Microsoft products Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38068 | Microsoft | Unspecified vulnerability in Microsoft products Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38071 | Microsoft | Unspecified vulnerability in Microsoft products Windows Remote Desktop Licensing Service Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38072 | Microsoft | Unspecified vulnerability in Microsoft products Windows Remote Desktop Licensing Service Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38073 | Microsoft | Unspecified vulnerability in Microsoft products Windows Remote Desktop Licensing Service Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38078 | Microsoft | Unspecified vulnerability in Microsoft Windows 11 21H2 and Windows 11 23H2 Xbox Wireless Adapter Remote Code Execution Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38091 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft WS-Discovery Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38095 | Microsoft | Unspecified vulnerability in Microsoft .Net and Visual Studio 2022 .NET and Visual Studio Denial of Service Vulnerability | 7.5 |
2024-07-09 | CVE-2024-38112 | Microsoft | User Interface (UI) Misrepresentation of Critical Information vulnerability in Microsoft products Windows MSHTML Platform Spoofing Vulnerability | 7.5 |
2024-07-08 | CVE-2024-23562 | Hcltech | Unspecified vulnerability in Hcltech Domino 11.0/12.0/14.0 This vulnerability is being re-assessed. Vulnerability details will be updated. The security bulletin will be republished when further details are available. | 7.5 |
2024-07-08 | CVE-2024-31504 | Embedded Solutions | Classic Buffer Overflow vulnerability in Embedded-Solutions Freemodbus 20180912 Buffer Overflow vulnerability in SILA Embedded Solutions GmbH freemodbus v.2018-09-12 allows a remtoe attacker to cause a denial of service via the LINUXTCP server component. | 7.5 |
2024-07-08 | CVE-2024-24974 | Openvpn | Unspecified vulnerability in Openvpn The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service. | 7.5 |
2024-07-11 | CVE-2024-39546 | | A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system. This issue affects Junos OS Evolved: * All versions prior to 21.2R3-S8-EVO, * 21.4 versions prior to 21.4R3-S6-EVO, * 22.1 versions prior to 22.1R3-S5-EVO, * 22.2 versions prior to 22.2R3-S3-EVO, * 22.3 versions prior to 22.3R3-S3-EVO, * 22.4 versions prior to 22.4R3-EVO, * 23.2 versions prior to 23.2R2-EVO. | 7.3 |
2024-07-09 | CVE-2024-30061 | Microsoft | Unspecified vulnerability in Microsoft Dynamics 365 9.1 Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | 7.3 |
2024-07-09 | CVE-2024-38033 | Microsoft | Unspecified vulnerability in Microsoft products PowerShell Elevation of Privilege Vulnerability | 7.3 |
2024-07-09 | CVE-2024-38081 | | .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability | 7.3 |
2024-07-12 | CVE-2024-5902 | | The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name parameter in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. | 7.2 |
2024-07-11 | CVE-2024-6447 | | The FULL – Cliente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the license plan parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping as well as missing authorization and capability checks on the related functions. | 7.2 |
2024-07-09 | CVE-2024-38019 | Microsoft | Integer Overflow or Wraparound vulnerability in Microsoft products Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability | 7.2 |
2024-07-09 | CVE-2024-38023 | Microsoft | Deserialization of Untrusted Data vulnerability in Microsoft Sharepoint Server 2016/2019 Microsoft SharePoint Server Remote Code Execution Vulnerability | 7.2 |
2024-07-09 | CVE-2024-38024 | Microsoft | Deserialization of Untrusted Data vulnerability in Microsoft Sharepoint Server 2016/2019 Microsoft SharePoint Server Remote Code Execution Vulnerability | 7.2 |
2024-07-09 | CVE-2024-38025 | Microsoft | Out-of-bounds Write vulnerability in Microsoft products Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability | 7.2 |
2024-07-09 | CVE-2024-38028 | Microsoft | Out-of-bounds Read vulnerability in Microsoft products Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability | 7.2 |
2024-07-09 | CVE-2024-38044 | Microsoft | Incorrect Conversion between Numeric Types vulnerability in Microsoft products DHCP Server Service Remote Code Execution Vulnerability | 7.2 |
2024-07-09 | CVE-2024-38094 | Microsoft | Deserialization of Untrusted Data vulnerability in Microsoft Sharepoint Server 2016/2019 Microsoft SharePoint Remote Code Execution Vulnerability | 7.2 |
2024-07-09 | CVE-2024-5479 | | The Easy Pixels plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 2.13 due to insufficient input sanitization and output escaping. | 7.2 |
2024-07-09 | CVE-2024-6123 | | The Bit Form plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'iconUpload' function in all versions up to, and including, 2.12.2. | 7.2 |
2024-07-09 | CVE-2024-6180 | | The EventON plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'eventon_import_settings' ajax action in all versions up to, and including, 2.2.15. | 7.2 |
2024-07-09 | CVE-2024-28748 | | A remote attacker with high privileges may use a reading file function to inject OS commands. | 7.2 |
2024-07-09 | CVE-2024-28749 | | A remote attacker with high privileges may use a writing file function to inject OS commands. | 7.2 |
2024-07-08 | CVE-2023-34435 | Realtek Level1 | Improper Verification of Cryptographic Signature vulnerability in multiple products A firmware update vulnerability exists in the boa formUpload functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-41251 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products A stack-based buffer overflow vulnerability exists in the boa formRoute functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-45215 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products A stack-based buffer overflow vulnerability exists in the boa setRepeaterSsid functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-45742 | Realtek Level1 | Integer Overflow or Wraparound vulnerability in multiple products An integer overflow vulnerability exists in the boa updateConfigIntoFlash functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-47856 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products A stack-based buffer overflow vulnerability exists in the boa set_RadvdPrefixParam functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-48270 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products A stack-based buffer overflow vulnerability exists in the boa formDnsv6 functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-49073 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products A stack-based buffer overflow vulnerability exists in the boa formFilter functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-49593 | Level1 | Unspecified vulnerability in Level1 Wbr-6013 Firmware Rer4Av3411B2T2Rlev09170623 Leftover debug code exists in the boa formSysCmd functionality of LevelOne WBR-6013 RER4_A_v3411b_2T2R_LEV_09_170623. | 7.2 |
2024-07-08 | CVE-2023-49595 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products A stack-based buffer overflow vulnerability exists in the boa rollback_control_code functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-49867 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products A stack-based buffer overflow vulnerability exists in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-50239 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-50240 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-50243 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-50244 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-50330 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products A stack-based buffer overflow vulnerability exists in the boa getInfo functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-50381 | Realtek Level1 | OS Command Injection vulnerability in multiple products Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-50382 | Realtek Level1 | OS Command Injection vulnerability in multiple products Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2023-50383 | Realtek Level1 | OS Command Injection vulnerability in multiple products Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-08 | CVE-2024-21778 | Realtek Level1 | Out-of-bounds Write vulnerability in multiple products A heap-based buffer overflow vulnerability exists in the configuration file mib_init_value_array functionality of Realtek rtl819x Jungle SDK v3.4.11. | 7.2 |
2024-07-11 | CVE-2024-5679 | Schneider Electric | Out-of-bounds Write vulnerability in Schneider-Electric Ecostruxure Foxboro DCS Control Core Services CWE-787: Out-of-Bounds Write vulnerability exists that could cause local denial-of-service, or kernel memory leak when a malicious actor with local user access crafts a script/program using an IOCTL call in the Foxboro.sys driver. | 7.1 |
2024-07-09 | CVE-2024-30081 | Microsoft | Unspecified vulnerability in Microsoft products Windows NTLM Spoofing Vulnerability | 7.1 |
2024-07-09 | CVE-2024-38032 | Microsoft | Out-of-bounds Write vulnerability in Microsoft products Microsoft Xbox Remote Code Execution Vulnerability | 7.1 |
2024-07-09 | CVE-2024-34123 | | Premiere Pro versions 23.6.5, 24.4.1 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. | 7.0 |
2024-07-09 | CVE-2024-6222 | Docker | Unspecified vulnerability in Docker Desktop In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default. | 7.0 |
2024-07-09 | CVE-2024-38022 | Microsoft | Link Following vulnerability in Microsoft products Windows Image Acquisition Elevation of Privilege Vulnerability | 7.0 |
2024-07-09 | CVE-2024-38069 | Microsoft | Improper Verification of Cryptographic Signature vulnerability in Microsoft products Windows Enroll Engine Security Feature Bypass Vulnerability | 7.0 |