Weekly Vulnerabilities Reports > October 7 to 13, 2024
Overview
552 new vulnerabilities reported during this period, including 38 critical vulnerabilities and 266 high severity vulnerabilities. This weekly summary report vulnerabilities in 462 products from 102 vendors including Microsoft, Adobe, Dlink, Siemens, and Qualcomm. Vulnerabilities are notably categorized as "Cross-site Scripting", "SQL Injection", "Out-of-bounds Write", "Classic Buffer Overflow", and "Out-of-bounds Read".
- 354 reported vulnerabilities are remotely exploitables.
- 137 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 274 reported vulnerabilities are exploitable by an anonymous user.
- Microsoft has the most reported vulnerabilities, with 114 reported vulnerabilities.
- Codezips has the most reported critical vulnerabilities, with 3 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
38 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-10-08 | CVE-2024-47553 | Siemens | Argument Injection or Modification vulnerability in Siemens Sinec Security Monitor A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). | 9.9 |
2024-10-13 | CVE-2024-9916 | Usualtool | OS Command Injection vulnerability in Usualtool Usualtoolcms 9.0 A vulnerability, which was classified as critical, has been found in HuangDou UTCMS V9. | 9.8 |
2024-10-12 | CVE-2024-9047 | The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. | 9.8 | |
2024-10-11 | CVE-2024-47331 | Ninjateam | SQL Injection vulnerability in Ninjateam Multi Step for Contact Form 7 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NinjaTeam Multi Step for Contact Form allows SQL Injection.This issue affects Multi Step for Contact Form: from n/a through 2.7.7. | 9.8 |
2024-10-11 | CVE-2024-45402 | Dena | Double Free vulnerability in Dena Picotls Picotls is a TLS protocol library that allows users select different crypto backends based on their use case. | 9.8 |
2024-10-11 | CVE-2024-47074 | Dataease | Deserialization of Untrusted Data vulnerability in Dataease DataEase is an open source data visualization analysis tool. | 9.8 |
2024-10-11 | CVE-2024-9822 | Pedalo | Authentication Bypass Using an Alternate Path or Channel vulnerability in Pedalo Connector The Pedalo Connector plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.5. | 9.8 |
2024-10-10 | CVE-2024-9818 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Online Veterinary Appointment System 1.0 A vulnerability classified as critical has been found in SourceCodester Online Veterinary Appointment System 1.0. | 9.8 |
2024-10-10 | CVE-2024-47167 | Gradio Project | Server-Side Request Forgery (SSRF) vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 9.8 |
2024-10-10 | CVE-2024-9814 | Codezips | SQL Injection vulnerability in Codezips Pharmacy Management System 1.0 A vulnerability, which was classified as critical, was found in Codezips Pharmacy Management System 1.0. | 9.8 |
2024-10-10 | CVE-2024-9811 | Code Projects | SQL Injection vulnerability in Code-Projects Restaurant Reservation System 1.0 A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. | 9.8 |
2024-10-10 | CVE-2024-9812 | Code Projects | SQL Injection vulnerability in Code-Projects Crud Operation System 1.0 A vulnerability classified as critical was found in code-projects Crud Operation System 1.0. | 9.8 |
2024-10-10 | CVE-2024-9813 | Codezips | SQL Injection vulnerability in Codezips Pharmacy Management System 1.0 A vulnerability, which was classified as critical, has been found in Codezips Pharmacy Management System 1.0. | 9.8 |
2024-10-10 | CVE-2024-47636 | Eyecix | Deserialization of Untrusted Data vulnerability in Eyecix Jobsearch WP JOB Board Deserialization of Untrusted Data vulnerability in Eyecix JobSearch allows Object Injection.This issue affects JobSearch: from n/a through 2.5.9. | 9.8 |
2024-10-10 | CVE-2024-9793 | Tenda | OS Command Injection vulnerability in Tenda Ac1206 Firmware 15.03.06.23 A vulnerability classified as critical was found in Tenda AC1206 up to 15.03.06.23. | 9.8 |
2024-10-10 | CVE-2024-9794 | Codezips | Unrestricted Upload of File with Dangerous Type vulnerability in Codezips Online Shopping Portal 1.0 A vulnerability, which was classified as critical, has been found in Codezips Online Shopping Portal 1.0. | 9.8 |
2024-10-10 | CVE-2024-9201 | Seur | SQL Injection vulnerability in Seur The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint. | 9.8 |
2024-10-10 | CVE-2024-45115 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. | 9.8 |
2024-10-10 | CVE-2024-9796 | Internet Formation | SQL Injection vulnerability in Internet-Formation Wp-Advanced-Search The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks | 9.8 |
2024-10-10 | CVE-2024-9518 | Wpuserplus | Unspecified vulnerability in Wpuserplus Userplus 1.0/1.1/2.0 The UserPlus plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0 due to insufficient restriction on the 'form_actions' and 'userplus_update_user_profile' functions. | 9.8 |
2024-10-09 | CVE-2024-9680 | Mozilla Debian | Use After Free vulnerability in multiple products An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. | 9.8 |
2024-10-09 | CVE-2024-32608 | Hdfgroup | Out-of-bounds Write vulnerability in Hdfgroup Hdf5 HDF5 library through 1.14.3 has memory corruption in H5A__close resulting in the corruption of the instruction pointer and causing denial of service or potential code execution. | 9.8 |
2024-10-08 | CVE-2024-43468 | Microsoft Configuration Manager Remote Code Execution Vulnerability | 9.8 | |
2024-10-08 | CVE-2024-43488 | Microsoft | Unspecified vulnerability in Microsoft Visual Studio Code Missing authentication for critical function in Visual Studio Code extension for Arduino allows an unauthenticated attacker to perform remote code execution through network attack vector. | 9.8 |
2024-10-08 | CVE-2024-47009 | Ivanti | Path Traversal vulnerability in Ivanti Avalanche Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to bypass authentication. | 9.8 |
2024-10-08 | CVE-2024-47010 | Ivanti | Path Traversal vulnerability in Ivanti Avalanche Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to bypass authentication. | 9.8 |
2024-10-08 | CVE-2024-8911 | The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11. | 9.8 | |
2024-10-08 | CVE-2024-8943 | The LatePoint plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.0.12. | 9.8 | |
2024-10-07 | CVE-2024-47556 | Xerox | Path Traversal vulnerability in Xerox Freeflow Core Pre-Auth RCE via Path Traversal | 9.8 |
2024-10-07 | CVE-2024-47557 | Xerox | Path Traversal vulnerability in Xerox Freeflow Core Pre-Auth RCE via Path Traversal | 9.8 |
2024-10-07 | CVE-2024-46446 | Mecha CMS | Path Traversal vulnerability in Mecha-Cms Mecha 3.0.0 Mecha CMS 3.0.0 is vulnerable to Directory Traversal. | 9.8 |
2024-10-07 | CVE-2024-33066 | Qualcomm | Unspecified vulnerability in Qualcomm products Memory corruption while redirecting log file to any file location with any file name. | 9.8 |
2024-10-10 | CVE-2024-47871 | Gradio Project | Missing Encryption of Sensitive Data vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 9.1 |
2024-10-10 | CVE-2024-9487 | Github | Improper Verification of Cryptographic Signature vulnerability in Github Enterprise Server An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed resulting in unauthorized provisioning of users and access to the instance. | 9.1 |
2024-10-10 | CVE-2024-48949 | Indutny | Improper Verification of Cryptographic Signature vulnerability in Indutny Elliptic The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation. | 9.1 |
2024-10-09 | CVE-2024-9465 | Paloaltonetworks | SQL Injection vulnerability in Paloaltonetworks Expedition An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. | 9.1 |
2024-10-08 | CVE-2024-43591 | Microsoft | Unspecified vulnerability in Microsoft Azure CLI and Azure Service Connector Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability | 9.1 |
2024-10-08 | CVE-2024-38124 | Microsoft | Unspecified vulnerability in Microsoft products Windows Netlogon Elevation of Privilege Vulnerability | 9.0 |
266 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-10-13 | CVE-2024-9915 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability classified as critical was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-13 | CVE-2024-9913 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-13 | CVE-2024-9914 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability classified as critical has been found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-13 | CVE-2024-9912 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-13 | CVE-2024-9911 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-13 | CVE-2024-9910 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. | 8.8 |
2024-10-13 | CVE-2024-9909 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability has been found in D-Link DIR-619L B1 2.06 and classified as critical. | 8.8 |
2024-10-13 | CVE-2024-9908 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-13 | CVE-2024-9905 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Online Eyewear Shop 1.0 A vulnerability, which was classified as critical, has been found in SourceCodester Online Eyewear Shop 1.0. | 8.8 |
2024-10-12 | CVE-2024-9894 | Blood Bank System Project | SQL Injection vulnerability in Blood Bank System Project Blood Bank System 1.0 A vulnerability, which was classified as critical, was found in code-projects Blood Bank System 1.0. | 8.8 |
2024-10-12 | CVE-2024-9821 | The Bot for Telegram on WooCommerce plugin for WordPress is vulnerable to sensitive information disclosure due to missing authorization checks on the 'stm_wpcfto_get_settings' AJAX action in all versions up to, and including, 1.2.4. | 8.8 | |
2024-10-11 | CVE-2024-8970 | Gitlab | Unspecified vulnerability in Gitlab An issue was discovered in GitLab CE/EE affecting all versions starting from 11.6 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows an attacker to trigger a pipeline as another user under certain circumstances. | 8.8 |
2024-10-11 | CVE-2024-9164 | Gitlab | Unspecified vulnerability in Gitlab An issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, starting from 17.3, prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows running pipelines on arbitrary branches. | 8.8 |
2024-10-10 | CVE-2024-9817 | Blood Bank System Project | SQL Injection vulnerability in Blood Bank System Project Blood Bank System 1.0 A vulnerability was found in code-projects Blood Bank System 1.0. | 8.8 |
2024-10-10 | CVE-2024-9785 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability classified as critical was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-10 | CVE-2024-9786 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability, which was classified as critical, has been found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-10 | CVE-2024-9782 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06 A vulnerability was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-10 | CVE-2024-9783 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06 A vulnerability was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-10 | CVE-2024-9784 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06 A vulnerability classified as critical has been found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-10 | CVE-2024-45148 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authentication vulnerability that could result in a security feature bypass. | 8.8 |
2024-10-10 | CVE-2024-9522 | Lagunaisw | Missing Authentication for Critical Function vulnerability in Lagunaisw WP Users Masquerade The WP Users Masquerade plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.0. | 8.8 |
2024-10-09 | CVE-2024-7292 | Progress | Improper Restriction of Excessive Authentication Attempts vulnerability in Progress Telerik Report Server In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a credential stuffing attack is possible through improper restriction of excessive login attempts. | 8.8 |
2024-10-09 | CVE-2024-7293 | Progress | Weak Password Requirements vulnerability in Progress Telerik Reporting In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a password brute forcing attack is possible through weak password requirements. | 8.8 |
2024-10-09 | CVE-2024-8014 | Progress | Unsafe Reflection vulnerability in Progress Telerik Reporting 12.0.18.125 In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible through object injection via an insecure type resolution vulnerability. | 8.8 |
2024-10-09 | CVE-2024-47659 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: smack: tcp: ipv4, fix incorrect labeling Currently, Smack mirrors the label of incoming tcp/ipv4 connections: when a label 'foo' connects to a label 'bar' with tcp/ipv4, 'foo' always gets 'foo' in returned ipv4 packets. | 8.8 |
2024-10-08 | CVE-2024-38179 | Microsoft | Unspecified vulnerability in Microsoft Azure Stack HCI Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability | 8.8 |
2024-10-08 | CVE-2024-38212 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-38265 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43453 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43481 | Microsoft | Unspecified vulnerability in Microsoft Power BI Report Server Power BI Report Server Spoofing Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43517 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft ActiveX Data Objects Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43518 | Microsoft | Unspecified vulnerability in Microsoft products Windows Telephony Server Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43519 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43532 | Microsoft | Unspecified vulnerability in Microsoft products Remote Registry Service Elevation of Privilege Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43533 | Microsoft | Unspecified vulnerability in Microsoft products Remote Desktop Client Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43549 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43564 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43589 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43592 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43593 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43599 | Microsoft | Unspecified vulnerability in Microsoft products Remote Desktop Client Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43607 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43608 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-43611 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 8.8 |
2024-10-08 | CVE-2024-47562 | Siemens | Command Injection vulnerability in Siemens Sinec Security Monitor A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). | 8.8 |
2024-10-08 | CVE-2024-34665 | Samsung | Out-of-bounds Write vulnerability in Samsung Android 12.0/13.0/14.0 Out-of-bounds write in parsing h.264 format in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. | 8.8 |
2024-10-08 | CVE-2024-34666 | Samsung | Out-of-bounds Write vulnerability in Samsung Android 12.0/13.0/14.0 Out-of-bounds write in parsing h.264 format in a specific mode in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. | 8.8 |
2024-10-08 | CVE-2024-34667 | Samsung | Out-of-bounds Write vulnerability in Samsung Android 12.0/13.0/14.0 Out-of-bounds write in parsing h.265 format in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. | 8.8 |
2024-10-08 | CVE-2024-34668 | Samsung | Out-of-bounds Write vulnerability in Samsung Android 12.0/13.0/14.0 Out-of-bounds write in parsing h.263 format in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. | 8.8 |
2024-10-08 | CVE-2024-34669 | Samsung | Out-of-bounds Write vulnerability in Samsung Android 12.0/13.0/14.0 Out-of-bounds write in parsing h.263+ format in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. | 8.8 |
2024-10-08 | CVE-2024-8926 | PHP FPM | OS Command Injection vulnerability in PHP-Fpm In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. | 8.8 |
2024-10-07 | CVE-2024-45291 | Phpoffice | Server-Side Request Forgery (SSRF) vulnerability in PHPoffice PHPspreadsheet PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. | 8.8 |
2024-10-07 | CVE-2024-47558 | Xerox | Path Traversal vulnerability in Xerox Freeflow Core 7.0 Authenticated RCE via Path Traversal | 8.8 |
2024-10-07 | CVE-2024-47559 | Xerox | Path Traversal vulnerability in Xerox Freeflow Core 7.0 Authenticated RCE via Path Traversal | 8.8 |
2024-10-07 | CVE-2024-9570 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. | 8.8 |
2024-10-07 | CVE-2024-9568 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-07 | CVE-2024-9569 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability has been found in D-Link DIR-619L B1 2.06 and classified as critical. | 8.8 |
2024-10-07 | CVE-2024-9567 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability, which was classified as critical, has been found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-07 | CVE-2024-9566 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-619L Firmware 2.06B1 A vulnerability classified as critical was found in D-Link DIR-619L B1 2.06. | 8.8 |
2024-10-07 | CVE-2024-9564 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-605L Firmware 2.13B01 A vulnerability, which was classified as critical, was found in D-Link DIR-605L 2.13B01 BETA. | 8.8 |
2024-10-07 | CVE-2024-9565 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-605L Firmware 2.13B01 A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. | 8.8 |
2024-10-07 | CVE-2024-9563 | Dlink | Classic Buffer Overflow vulnerability in Dlink Dir-605L Firmware 2.13B01 A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13B01 BETA. | 8.8 |
2024-10-08 | CVE-2024-43584 | Microsoft | Unspecified vulnerability in Microsoft products Windows Scripting Engine Security Feature Bypass Vulnerability | 8.4 |
2024-10-08 | CVE-2024-8215 | Payara | Cross-site Scripting vulnerability in Payara Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Payara Platform Payara Server (Admin Console modules) allows Remote Code Inclusion.This issue affects Payara Server: from 5.20.0 before 5.68.0, from 6.0.0 before 6.19.0, from 6.2022.1 before 6.2024.10, from 4.1.2.191.1 before 4.1.2.191.51. | 8.4 |
2024-10-10 | CVE-2024-47084 | Gradio Project | Unspecified vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 8.3 |
2024-10-08 | CVE-2024-43574 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability | 8.3 |
2024-10-11 | CVE-2024-47490 | An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network based attacker to cause increased consumption of resources, ultimately resulting in a Denial of Service (DoS). When specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the Routing Engine (RE), rather than being handled appropriately. | 8.2 | |
2024-10-07 | CVE-2024-43364 | Cacti | Cross-site Scripting vulnerability in Cacti Cacti is an open source performance and fault management framework. | 8.2 |
2024-10-07 | CVE-2024-43365 | Cacti | Cross-site Scripting vulnerability in Cacti 1.2.27 Cacti is an open source performance and fault management framework. | 8.2 |
2024-10-07 | CVE-2024-45051 | Discourse | Unspecified vulnerability in Discourse Discourse is an open source platform for community discussion. | 8.2 |
2024-10-07 | CVE-2024-33064 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Information disclosure while parsing the multiple MBSSID IEs from the beacon. | 8.2 |
2024-10-07 | CVE-2024-33073 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. | 8.2 |
2024-10-10 | CVE-2024-47870 | Gradio Project | Race Condition vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 8.1 |
2024-10-10 | CVE-2024-45116 | Adobe | Cross-site Scripting vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a Cross-Site Scripting (XSS) vulnerability that could be exploited to execute arbitrary code. | 8.1 |
2024-10-10 | CVE-2024-8977 | Gitlab | Server-Side Request Forgery (SSRF) vulnerability in Gitlab An issue has been discovered in GitLab EE affecting all versions starting from 15.10 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. | 8.1 |
2024-10-08 | CVE-2024-38229 | Microsoft | Unspecified vulnerability in Microsoft .Net and Visual Studio 2022 .NET and Visual Studio Remote Code Execution Vulnerability | 8.1 |
2024-10-08 | CVE-2024-43573 | Microsoft | Unspecified vulnerability in Microsoft products Windows MSHTML Platform Spoofing Vulnerability | 8.1 |
2024-10-08 | CVE-2024-43582 | Microsoft | Unspecified vulnerability in Microsoft products Remote Desktop Protocol Server Remote Code Execution Vulnerability | 8.1 |
2024-10-08 | CVE-2024-30092 | Windows Hyper-V Remote Code Execution Vulnerability | 8.0 | |
2024-10-08 | CVE-2024-43604 | Microsoft | Unspecified vulnerability in Microsoft Outlook 2016 Outlook for Android Elevation of Privilege Vulnerability | 8.0 |
2024-10-11 | CVE-2024-33578 | A DLL hijack vulnerability was reported in Lenovo Leyun that could allow a local attacker to execute code with elevated privileges. | 7.8 | |
2024-10-11 | CVE-2024-33579 | A DLL hijack vulnerability was reported in Lenovo Baiying that could allow a local attacker to execute code with elevated privileges. | 7.8 | |
2024-10-11 | CVE-2024-33580 | A DLL hijack vulnerability was reported in Lenovo Personal Cloud that could allow a local attacker to execute code with elevated privileges. | 7.8 | |
2024-10-11 | CVE-2024-33581 | A DLL hijack vulnerability was reported in Lenovo PC Manager AI intelligent scenario that could allow a local attacker to execute code with elevated privileges. | 7.8 | |
2024-10-11 | CVE-2024-33582 | A DLL hijack vulnerability was reported in Lenovo Service Framework that could allow a local attacker to execute code with elevated privileges. | 7.8 | |
2024-10-11 | CVE-2024-4089 | Lenovo | Uncontrolled Search Path Element vulnerability in Lenovo Superfile A DLL hijack vulnerability was reported in Lenovo Super File that could allow a local attacker to execute code with elevated privileges. | 7.8 |
2024-10-11 | CVE-2024-4130 | Lenovo | Uncontrolled Search Path Element vulnerability in Lenovo APP Store A DLL hijack vulnerability was reported in Lenovo App Store that could allow a local attacker to execute code with elevated privileges. | 7.8 |
2024-10-11 | CVE-2024-4131 | Lenovo | Uncontrolled Search Path Element vulnerability in Lenovo Emulator A DLL hijack vulnerability was reported in Lenovo Emulator that could allow a local attacker to execute code with elevated privileges. | 7.8 |
2024-10-11 | CVE-2024-4132 | Lenovo | Uncontrolled Search Path Element vulnerability in Lenovo Lock Screen A DLL hijack vulnerability was reported in Lenovo Lock Screen that could allow a local attacker to execute code with elevated privileges. | 7.8 |
2024-10-11 | CVE-2024-9046 | Lenovo | Uncontrolled Search Path Element vulnerability in Lenovo Starstudio A DLL hijack vulnerability was reported in Lenovo stARstudio that could allow a local attacker to execute code with elevated privileges. | 7.8 |
2024-10-10 | CVE-2024-47962 | Deltaww | Out-of-bounds Write vulnerability in Deltaww Cncsoft-G2 2.1.0.10 Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. | 7.8 |
2024-10-10 | CVE-2024-47963 | Deltaww | Out-of-bounds Write vulnerability in Deltaww Cncsoft-G2 2.1.0.10 Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a write past the end of an allocated object. | 7.8 |
2024-10-10 | CVE-2024-47964 | Deltaww | Out-of-bounds Write vulnerability in Deltaww Cncsoft-G2 2.1.0.10 Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. | 7.8 |
2024-10-10 | CVE-2024-47965 | Deltaww | Out-of-bounds Read vulnerability in Deltaww Cncsoft-G2 2.1.0.10 Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. | 7.8 |
2024-10-10 | CVE-2024-47966 | Deltaww | Use of Uninitialized Resource vulnerability in Deltaww Cncsoft-G2 2.1.0.10 Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. | 7.8 |
2024-10-10 | CVE-2024-48957 | Libarchive | Out-of-bounds Read vulnerability in Libarchive execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst. | 7.8 |
2024-10-10 | CVE-2024-48958 | Libarchive | Out-of-bounds Read vulnerability in Libarchive execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst. | 7.8 |
2024-10-09 | CVE-2024-9473 | Paloaltonetworks | Unspecified vulnerability in Paloaltonetworks Globalprotect A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect. | 7.8 |
2024-10-09 | CVE-2024-45136 | Adobe | Unrestricted Upload of File with Dangerous Type vulnerability in Adobe Incopy InCopy versions 19.4, 18.5.3 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution by an attacker. | 7.8 |
2024-10-09 | CVE-2024-45137 | Adobe | Unrestricted Upload of File with Dangerous Type vulnerability in Adobe Indesign InDesign Desktop versions 19.4, 18.5.3 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution. | 7.8 |
2024-10-09 | CVE-2024-47421 | Adobe | Out-of-bounds Read vulnerability in Adobe Framemaker Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. | 7.8 |
2024-10-09 | CVE-2024-47422 | Adobe | Untrusted Search Path vulnerability in Adobe Framemaker Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. | 7.8 |
2024-10-09 | CVE-2024-47423 | Adobe | Unrestricted Upload of File with Dangerous Type vulnerability in Adobe Framemaker Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution. | 7.8 |
2024-10-09 | CVE-2024-47424 | Adobe | Integer Overflow or Wraparound vulnerability in Adobe Framemaker Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47425 | Adobe | Integer Underflow (Wrap or Wraparound) vulnerability in Adobe Framemaker Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47670 | Linux | Out-of-bounds Write vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ocfs2: add bounds checking to ocfs2_xattr_find_entry() Add a paranoia check to make sure it doesn't stray beyond valid memory region containing ocfs2 xattr entries when scanning for a match. | 7.8 |
2024-10-09 | CVE-2024-7840 | Progress | Command Injection vulnerability in Progress Telerik Reporting 12.0.18.125 In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a command injection attack is possible through improper neutralization of hyperlink elements. | 7.8 |
2024-10-09 | CVE-2024-8048 | Progress | Unsafe Reflection vulnerability in Progress Telerik Reporting 12.0.18.125 In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible using object injection via insecure expression evaluation. | 7.8 |
2024-10-09 | CVE-2024-45138 | Adobe | Use After Free vulnerability in Adobe Substance 3D Stager 2.0.1/2.1.3/3.0.2 Substance3D - Stager versions 3.0.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-45139 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Stager 2.0.1/2.1.3/3.0.2 Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-45140 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Stager 2.0.1/2.1.3/3.0.2 Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-45141 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Stager 2.0.1/2.1.3/3.0.2 Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-45142 | Adobe | Unspecified vulnerability in Adobe Substance 3D Stager 2.0.1/2.1.3/3.0.2 Substance3D - Stager versions 3.0.3 and earlier are affected by a Write-what-where Condition vulnerability that could allow an attacker to execute arbitrary code in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-45143 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Stager 2.0.1/2.1.3/3.0.2 Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-45144 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Stager 2.0.1/2.1.3/3.0.2 Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-45152 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Stager 2.0.1/2.1.3/3.0.2 Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-46871 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. | 7.8 |
2024-10-09 | CVE-2024-47410 | Adobe | Out-of-bounds Write vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47411 | Adobe | Access of Uninitialized Pointer vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47412 | Adobe | Use After Free vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47413 | Adobe | Use After Free vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47414 | Adobe | Use After Free vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47415 | Adobe | Use After Free vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47416 | Adobe | Integer Overflow or Wraparound vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47417 | Adobe | Out-of-bounds Write vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-47418 | Adobe | Use After Free vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-45146 | Adobe | Use After Free vulnerability in Adobe Dimension Dimension versions 4.0.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-09 | CVE-2024-45150 | Adobe | Out-of-bounds Write vulnerability in Adobe Dimension Dimension versions 4.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-10-08 | CVE-2024-37979 | Microsoft | Unspecified vulnerability in Microsoft products Windows Kernel Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-37982 | Microsoft | Unspecified vulnerability in Microsoft products Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability | 7.8 |
2024-10-08 | CVE-2024-38261 | Microsoft | Unspecified vulnerability in Microsoft products Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43497 | Microsoft | Unspecified vulnerability in Microsoft Deepspeed DeepSpeed Remote Code Execution Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43501 | Microsoft | Unspecified vulnerability in Microsoft products Windows Common Log File System Driver Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43503 | Microsoft | Unspecified vulnerability in Microsoft Sharepoint Server 2016/2019 Microsoft SharePoint Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43504 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43505 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Office Visio Remote Code Execution Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43509 | Microsoft | Unspecified vulnerability in Microsoft products Windows Graphics Component Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43514 | Microsoft | Unspecified vulnerability in Microsoft products Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43516 | Microsoft | Unspecified vulnerability in Microsoft products Windows Secure Kernel Mode Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43527 | Microsoft | Unspecified vulnerability in Microsoft Windows 11 24H2 Windows Kernel Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43528 | Microsoft | Unspecified vulnerability in Microsoft products Windows Secure Kernel Mode Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43551 | Microsoft | Unspecified vulnerability in Microsoft products Windows Storage Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43556 | Microsoft | Unspecified vulnerability in Microsoft products Windows Graphics Component Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43560 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43563 | Microsoft | Unspecified vulnerability in Microsoft products Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43572 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Management Console Remote Code Execution Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43576 | Microsoft | Unspecified vulnerability in Microsoft 365 Apps and Office Long Term Servicing Channel Microsoft Office Remote Code Execution Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43583 | Microsoft | Unspecified vulnerability in Microsoft products Winlogon Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43590 | Microsoft | Unspecified vulnerability in Microsoft Visual Studio 2019 and Visual Studio 2022 Visual C++ Redistributable Installer Elevation of Privilege Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43601 | Microsoft | Unspecified vulnerability in Microsoft Visual Studio Code Visual Studio Code for Linux Remote Code Execution Vulnerability | 7.8 |
2024-10-08 | CVE-2024-43616 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Office Remote Code Execution Vulnerability | 7.8 |
2024-10-08 | CVE-2024-7612 | Ivanti | Incorrect Permission Assignment for Critical Resource vulnerability in Ivanti Endpoint Manager Mobile Insecure permissions in Ivanti EPMM before 12.1.0.4 allow a local authenticated attacker to modify sensitive application components. | 7.8 |
2024-10-08 | CVE-2024-8422 | Schneider Electric | Use After Free vulnerability in Schneider-Electric Zelio Soft 2 CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution, denial of service and loss of confidentiality & integrity when application user opens a malicious Zelio Soft 2 project file. | 7.8 |
2024-10-08 | CVE-2024-41902 | Siemens | Out-of-bounds Write vulnerability in Siemens Jt2Go A vulnerability has been identified in JT2Go (All versions < V2406.0003). | 7.8 |
2024-10-08 | CVE-2024-45463 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45464 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45465 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45466 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45467 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45468 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45469 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45470 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45471 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45472 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45473 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45474 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-45475 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 |
2024-10-08 | CVE-2024-34662 | Samsung | Unspecified vulnerability in Samsung Android 12.0/13.0/14.0 Improper access control in ActivityManager prior to SMR Oct-2024 Release 1 in select Android 12, 13 and SMR Sep-2024 Release 1 in select Android 14 allows local attackers to execute privileged behaviors. | 7.8 |
2024-10-07 | CVE-2024-9576 | Workbooth Project | Unspecified vulnerability in Workbooth Project Workbooth 2.5 Vulnerability in Distro Linux Workbooth v2.5 that allows to escalate privileges to the root user by manipulating the network configuration script. | 7.8 |
2024-10-07 | CVE-2024-21455 | Qualcomm | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products Memory corruption when a compat IOCTL call is followed by another IOCTL call from userspace to a driver. | 7.8 |
2024-10-07 | CVE-2024-23369 | Qualcomm | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products Memory corruption when invalid length is provided from HLOS for FRS/UDS request/response buffers. | 7.8 |
2024-10-07 | CVE-2024-33065 | Qualcomm | Unspecified vulnerability in Qualcomm products Memory corruption while taking snapshot when an offset variable is set by camera driver. | 7.8 |
2024-10-07 | CVE-2024-38399 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption while processing user packets to generate page faults. | 7.8 |
2024-10-07 | CVE-2024-43047 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption while maintaining memory maps of HLOS memory. | 7.8 |
2024-10-10 | CVE-2024-45117 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Input Validation vulnerability that could lead to arbitrary file system read. | 7.6 |
2024-10-11 | CVE-2024-48938 | Znuny | Unspecified vulnerability in Znuny Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows DoS/ReDos via email. | 7.5 |
2024-10-11 | CVE-2024-47877 | Codeclysm | Unspecified vulnerability in Codeclysm Extract Extract is aA Go library to extract archives in zip, tar.gz or tar.bz2 formats. | 7.5 |
2024-10-11 | CVE-2024-39547 | An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to cause a CPU-based Denial of Service (DoS). If specially crafted TCP traffic is received by the control plane, or a TCP session terminates unexpectedly, it will cause increased control plane CPU utilization by the rpd-server process. While not explicitly required, the impact is more severe when RIB sharding is enabled. Task accounting shows unexpected reads by the RPD Server jobs for shards: user@junos> show task accounting detail ... read:RPD Server.0.0.0.0+780.192.168.0.78+48886 TOT:00000003.00379787 MAX:00000000.00080516 RUNS: 233888\ read:RPD Server.0.0.0.0+780.192.168.0.78+49144 TOT:00000004.00007565 MAX:00000000.00080360 RUNS: 233888\ read:RPD Server.0.0.0.0+780.192.168.0.78+49694 TOT:00000003.00600584 MAX:00000000.00080463 RUNS: 233888\ read:RPD Server.0.0.0.0+780.192.168.0.78+50246 TOT:00000004.00346998 MAX:00000000.00080338 RUNS: 233888\ This issue affects: Junos OS with cRPD: * All versions before 21.2R3-S8, * 21.4 before 21.4R3-S7, * 22.1 before 22.1R3-S6, * 22.2 before 22.2R3-S4, * 22.3 before 22.3R3-S3, * 22.4 before 22.4R3-S2, * 23.2 before 23.2R2-S2, * 24.2 before 24.2R2; Junos OS Evolved with cRPD: * All versions before 21.4R3-S7-EVO, * 22.2 before 22.2R3-S4-EVO, * 22.3 before 22.3R3-S3-EVO, * 22.4 before 22.4R3-S2-EVO, * 23.2 before 23.2R2-EVO. | 7.5 | |
2024-10-11 | CVE-2024-47497 | An Uncontrolled Resource Consumption vulnerability in the http daemon (httpd) of Juniper Networks Junos OS on SRX Series, QFX Series, MX Series and EX Series allows an unauthenticated, network-based attacker to cause Denial-of-Service (DoS). An attacker can send specific HTTPS connection requests to the device, triggering the creation of processes that are not properly terminated. | 7.5 | |
2024-10-11 | CVE-2024-47499 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a scenario where BGP Monitoring Protocol (BMP) is configured with rib-in pre-policy monitoring, receiving a BGP update with a specifically malformed AS PATH attribute over an established BGP session, can cause an RPD crash and restart. This issue affects: Junos OS: * All versions before 21.2R3-S8, * 21.4 versions before 21.4R3-S8, * 22.2 versions before 22.2R3-S4, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3-S2, * 23.2 versions before 23.2R2-S1, * 23.4 versions before 23.4R1-S2, 23.4R2; Junos OS Evolved: * All versions before 21.2R3-S8-EVO, * 21.4 versions before 21.4R3-S8-EVO, * 22.2 versions before 22.2R3-S4-EVO, * 22.3 versions before 22.3R3-S3-EVO, * 22.4 versions before 22.4R3-S2-EVO, * 23.2 versions before 23.2R2-S1-EVO, * 23.4 versions before 23.4R1-S2-EVO, 23.4R2-EVO. | 7.5 | |
2024-10-11 | CVE-2024-47502 | An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In specific cases the state of TCP sessions that are terminated is not cleared, which over time leads to an exhaustion of resources, preventing new connections to the control plane from being established. A continuously increasing number of connections shown by: user@host > show system connections is indicative of the problem. | 7.5 | |
2024-10-11 | CVE-2024-47504 | An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos). When a non-clustered SRX5000 device receives a specifically malformed packet this will cause a flowd crash and restart. This issue affects Junos OS: * 22.1 releases 22.1R1 and later before 22.2R3-S5, * 22.3 releases before 22.3R3-S4, * 22.4 releases before 22.4R3-S4, * 23.2 releases before 23.2R2-S2, * 23.4 releases before 23.4R2-S1, * 24.2 releases before 24.2R1-S1, 24.2R2. Please note that the PR does indicate that earlier versions have been fixed as well, but these won't be adversely impacted by this. | 7.5 | |
2024-10-11 | CVE-2024-8376 | Eclipse | Improper Handling of Exceptional Conditions vulnerability in Eclipse Mosquitto In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fault or heap-use-after-free by sending specific sequences of "CONNECT", "DISCONNECT", "SUBSCRIBE", "UNSUBSCRIBE" and "PUBLISH" packets. | 7.5 |
2024-10-11 | CVE-2024-45396 | Dena | Reachable Assertion vulnerability in Dena Quicly Quicly is an IETF QUIC protocol implementation. | 7.5 |
2024-10-11 | CVE-2024-45397 | Dena | Authentication Bypass by Spoofing vulnerability in Dena H2O h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. | 7.5 |
2024-10-11 | CVE-2024-45403 | Dena | Reachable Assertion vulnerability in Dena H2O h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. | 7.5 |
2024-10-10 | CVE-2024-47867 | Gradio Project | Unspecified vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 7.5 |
2024-10-10 | CVE-2024-47868 | Gradio Project | Path Traversal vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 7.5 |
2024-10-10 | CVE-2024-9797 | Code Projects | SQL Injection vulnerability in Code-Projects Blood Bank System 1.0 A vulnerability, which was classified as critical, was found in code-projects Blood Bank System 1.0. | 7.5 |
2024-10-10 | CVE-2024-6747 | Checkmk | Information Exposure vulnerability in Checkmk 2.1.0/2.2.0 Information leakage in mknotifyd in Checkmk before 2.3.0p18, 2.2.0p36, 2.1.0p49 and in 2.0.0p39 (EOL) allows attacker to get potentially sensitive data | 7.5 |
2024-10-10 | CVE-2024-9781 | Wireshark | Unspecified vulnerability in Wireshark 4.2.0/4.4.0 AppleTalk and RELOAD Framing dissector crash in Wireshark 4.4.0 and 4.2.0 to 4.2.7 allows denial of service via packet injection or crafted capture file | 7.5 |
2024-10-10 | CVE-2024-9156 | Templateinvaders | SQL Injection vulnerability in Templateinvaders TI Woocommerce Wishlist The TI WooCommerce Wishlist WordPress plugin through 2.8.2 is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 7.5 |
2024-10-09 | CVE-2024-39515 | An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). | 7.5 | |
2024-10-09 | CVE-2024-39516 | An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). | 7.5 | |
2024-10-09 | CVE-2024-39525 | An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems with BGP traceoptions enabled and requires a BGP session to be already established. Systems without BGP traceoptions enabled are not affected by this issue. This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability. This issue affects: Junos OS: * All versions before 21.2R3-S8, * from 21.4 before 21.4R3-S8, * from 22.2 before 22.2R3-S4, * from 22.3 before 22.3R3-S4, * from 22.4 before 22.4R3-S3, * from 23.2 before 23.2R2-S1, * from 23.4 before 23.4R2; Junos OS Evolved: * All versions before 21.2R3-S8-EVO, * from 21.4-EVO before 21.4R3-S8-EVO, * from 22.2-EVO before 22.2R3-S4-EVO, * from 22.3-EVO before 22.3R3-S4-EVO, * from 22.4-EVO before 22.4R3-S3-EVO, * from 23.2-EVO before 23.2R2-S1-EVO, * from 23.4-EVO before 23.4R2-EVO. | 7.5 | |
2024-10-09 | CVE-2024-46307 | Sparkshop | Unspecified vulnerability in Sparkshop A loop hole in the payment logic of Sparkshop v1.16 allows attackers to arbitrarily modify the number of products. | 7.5 |
2024-10-09 | CVE-2024-9463 | Paloaltonetworks | OS Command Injection vulnerability in Paloaltonetworks Expedition An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. | 7.5 |
2024-10-08 | CVE-2024-38029 | Microsoft | Unspecified vulnerability in Microsoft Windows Server 2022 23H2 Microsoft OpenSSH for Windows Remote Code Execution Vulnerability | 7.5 |
2024-10-08 | CVE-2024-38149 | Microsoft | Unspecified vulnerability in Microsoft products BranchCache Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-38262 | Microsoft | Unspecified vulnerability in Microsoft products Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43483 | Microsoft | Unspecified vulnerability in Microsoft .Net and .Net Framework .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43484 | Microsoft | Unspecified vulnerability in Microsoft .Net and .Net Framework .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43485 | Microsoft | Unspecified vulnerability in Microsoft .Net .NET and Visual Studio Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43506 | Microsoft | Unspecified vulnerability in Microsoft products BranchCache Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43512 | Microsoft | Unspecified vulnerability in Microsoft products Windows Standards-Based Storage Management Service Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43515 | Microsoft | Unspecified vulnerability in Microsoft products Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43521 | Microsoft | Unspecified vulnerability in Microsoft products Windows Hyper-V Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43541 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43544 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43545 | Microsoft | Unspecified vulnerability in Microsoft products Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43562 | Microsoft | Unspecified vulnerability in Microsoft products Windows Network Address Translation (NAT) Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43565 | Microsoft | Unspecified vulnerability in Microsoft products Windows Network Address Translation (NAT) Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43567 | Microsoft | Unspecified vulnerability in Microsoft products Windows Hyper-V Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-43575 | Microsoft | Unspecified vulnerability in Microsoft products Windows Hyper-V Denial of Service Vulnerability | 7.5 |
2024-10-08 | CVE-2024-47007 | Ivanti | NULL Pointer Dereference vulnerability in Ivanti Avalanche A NULL pointer dereference in WLAvalancheService.exe of Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to cause a denial of service. | 7.5 |
2024-10-08 | CVE-2024-47008 | Ivanti | Server-Side Request Forgery (SSRF) vulnerability in Ivanti Avalanche Server-side request forgery in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to leak sensitive information. | 7.5 |
2024-10-08 | CVE-2024-47011 | Ivanti | Path Traversal vulnerability in Ivanti Avalanche Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to leak sensitive information | 7.5 |
2024-10-08 | CVE-2024-45230 | Djangoproject | Unspecified vulnerability in Djangoproject Django An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. | 7.5 |
2024-10-08 | CVE-2024-47948 | Jetbrains | Path Traversal vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.07.3 path traversal leading to information disclosure was possible via server backups | 7.5 |
2024-10-08 | CVE-2024-47949 | Jetbrains | Path Traversal vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.07.3 path traversal allowed backup file write to arbitrary location | 7.5 |
2024-10-08 | CVE-2024-8927 | PHP FPM | Unspecified vulnerability in PHP-Fpm In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. | 7.5 |
2024-10-07 | CVE-2024-45290 | Phpoffice | Absolute Path Traversal vulnerability in PHPoffice PHPspreadsheet PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. | 7.5 |
2024-10-07 | CVE-2024-33049 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame. | 7.5 |
2024-10-07 | CVE-2024-33069 | Qualcomm | Use After Free vulnerability in Qualcomm products Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host. | 7.5 |
2024-10-07 | CVE-2024-33070 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing ESP IE from beacon/probe response frame. | 7.5 |
2024-10-07 | CVE-2024-33071 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing the MBSSID IE from the beacons when IE length is 0. | 7.5 |
2024-10-07 | CVE-2024-38397 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing probe response and assoc response frame. | 7.5 |
2024-10-09 | CVE-2024-43610 | Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector | 7.4 | |
2024-10-08 | CVE-2024-43456 | Microsoft | Unspecified vulnerability in Microsoft products Windows Remote Desktop Services Tampering Vulnerability | 7.4 |
2024-10-08 | CVE-2024-43550 | Microsoft | Unspecified vulnerability in Microsoft products Windows Secure Channel Spoofing Vulnerability | 7.4 |
2024-10-10 | CVE-2024-9581 | Happyplugins | Code Injection vulnerability in Happyplugins Shortcodes Anywhere The Shortcodes AnyWhere plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0.1. | 7.3 |
2024-10-08 | CVE-2024-43529 | Microsoft | Unspecified vulnerability in Microsoft products Windows Print Spooler Elevation of Privilege Vulnerability | 7.3 |
2024-10-08 | CVE-2024-43552 | Microsoft | Unspecified vulnerability in Microsoft products Windows Shell Remote Code Execution Vulnerability | 7.3 |
2024-10-08 | CVE-2024-43571 | Microsoft | Unspecified vulnerability in Microsoft Windows 11 24H2 Sudo for Windows Spoofing Vulnerability | 7.3 |
2024-10-08 | CVE-2024-47194 | Siemens | Uncontrolled Search Path Element vulnerability in Siemens Modelsim and Questa A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). | 7.3 |
2024-10-08 | CVE-2024-47195 | Siemens | Uncontrolled Search Path Element vulnerability in Siemens Modelsim and Questa A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). | 7.3 |
2024-10-08 | CVE-2024-47196 | Siemens | Uncontrolled Search Path Element vulnerability in Siemens Modelsim and Questa A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). | 7.3 |
2024-10-13 | CVE-2024-9918 | Usualtool | SQL Injection vulnerability in Usualtool Usualtoolcms 9.0 A vulnerability has been found in HuangDou UTCMS V9 and classified as critical. | 7.2 |
2024-10-12 | CVE-2024-8757 | The WP Post Author – Boost Your Blog's Engagement with Author Box, Social Links, Co-Authors, Guest Authors, Post Rating System, and Custom User Registration Form Builder plugin for WordPress is vulnerable to time-based SQL Injection via the linked_user_id parameter in all versions up to, and including, 3.8.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 7.2 | |
2024-10-11 | CVE-2024-35517 | Netgear | Command Injection vulnerability in Netgear Xr1000 Firmware 1.0.0.64 Netgear XR1000 v1.0.0.64 is vulnerable to command injection in usb_remote_smb_conf.cgi via the share_name parameter. | 7.2 |
2024-10-11 | CVE-2024-35522 | Netgear | Command Injection vulnerability in Netgear Ex3700 Firmware Netgear EX3700 ' AC750 WiFi Range Extender Essentials Edition before 1.0.0.98 contains an authenticated command injection in operating_mode.cgi via the ap_mode parameter with ap_24g_manual set to 1 and ap_24g_manual_sec set to NotNone. | 7.2 |
2024-10-10 | CVE-2024-9815 | Codezips | Unrestricted Upload of File with Dangerous Type vulnerability in Codezips Tourist Management System 1.0 A vulnerability has been found in Codezips Tourist Management System 1.0 and classified as critical. | 7.2 |
2024-10-10 | CVE-2024-9816 | Codezips | Unrestricted Upload of File with Dangerous Type vulnerability in Codezips Tourist Management System 1.0 A vulnerability was found in Codezips Tourist Management System 1.0 and classified as critical. | 7.2 |
2024-10-10 | CVE-2024-9180 | Hashicorp | Unspecified vulnerability in Hashicorp Vault A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their own or another user’s privileges to Vault’s root policy. | 7.2 |
2024-10-10 | CVE-2024-9790 | Lylme | SQL Injection vulnerability in Lylme Spage 1.9.5 A vulnerability was found in LyLme_spage 1.9.5. | 7.2 |
2024-10-10 | CVE-2024-9788 | Lylme | SQL Injection vulnerability in Lylme Spage 1.9.5 A vulnerability has been found in LyLme_spage 1.9.5 and classified as critical. | 7.2 |
2024-10-10 | CVE-2024-9789 | Lylme | SQL Injection vulnerability in Lylme Spage 1.9.5 A vulnerability was found in LyLme_spage 1.9.5 and classified as critical. | 7.2 |
2024-10-10 | CVE-2024-9022 | Total Soft | SQL Injection vulnerability in Total-Soft TS Poll The TS Poll – Survey, Versus Poll, Image Poll, Video Poll plugin for WordPress is vulnerable to SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 2.3.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 7.2 |
2024-10-10 | CVE-2024-9519 | Wpuserplus | Unspecified vulnerability in Wpuserplus Userplus 1.0/1.1/2.0 The UserPlus plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the 'save_metabox_form' function in versions up to, and including, 2.0. | 7.2 |
2024-10-09 | CVE-2024-8015 | Progress | Unsafe Reflection vulnerability in Progress Telerik Report Server In Progress Telerik Report Server versions prior to 2024 Q3 (10.2.24.924), a remote code execution attack is possible through object injection via an insecure type resolution vulnerability. | 7.2 |
2024-10-08 | CVE-2024-9379 | Ivanti | SQL Injection vulnerability in Ivanti Endpoint Manager Cloud Services Appliance 4.5/4.6 SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements. | 7.2 |
2024-10-08 | CVE-2024-9380 | Ivanti | OS Command Injection vulnerability in Ivanti Endpoint Manager Cloud Services Appliance 4.5/4.6 An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution. | 7.2 |
2024-10-08 | CVE-2024-9381 | Ivanti | Path Traversal vulnerability in Ivanti Endpoint Manager Cloud Services Appliance 4.5/4.6 Path traversal in Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to bypass restrictions. | 7.2 |
2024-10-08 | CVE-2024-45330 | Fortinet | Unspecified vulnerability in Fortinet Fortianalyzer and Fortianalyzer Cloud A use of externally-controlled format string in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.2 through 7.2.5 allows attacker to escalate its privileges via specially crafted requests. | 7.2 |
2024-10-07 | CVE-2024-43363 | Cacti | Code Injection vulnerability in Cacti Cacti is an open source performance and fault management framework. | 7.2 |
2024-10-13 | CVE-2024-6959 | Lollms | Cross-Site Request Forgery (CSRF) vulnerability in Lollms web UI 9.8 A vulnerability in parisneo/lollms-webui version 9.8 allows for a Denial of Service (DOS) attack when uploading an audio file. | 7.1 |
2024-10-08 | CVE-2024-20659 | Windows Hyper-V Security Feature Bypass Vulnerability | 7.1 | |
2024-10-08 | CVE-2024-38097 | Microsoft | Unspecified vulnerability in Microsoft Azure Monitor Agent 1.26.0 Azure Monitor Agent Elevation of Privilege Vulnerability | 7.1 |
2024-10-08 | CVE-2024-43502 | Microsoft | Unspecified vulnerability in Microsoft products Windows Kernel Elevation of Privilege Vulnerability | 7.1 |
2024-10-08 | CVE-2024-43581 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft OpenSSH for Windows Remote Code Execution Vulnerability | 7.1 |
2024-10-08 | CVE-2024-43615 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft OpenSSH for Windows Remote Code Execution Vulnerability | 7.1 |
2024-10-08 | CVE-2024-43511 | Microsoft | Unspecified vulnerability in Microsoft products Windows Kernel Elevation of Privilege Vulnerability | 7.0 |
2024-10-08 | CVE-2024-43522 | Microsoft | Unspecified vulnerability in Microsoft Windows 11 22H2 and Windows 11 23H2 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability | 7.0 |
2024-10-08 | CVE-2024-43535 | Microsoft | Unspecified vulnerability in Microsoft products Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | 7.0 |
2024-10-08 | CVE-2024-43553 | Microsoft | Unspecified vulnerability in Microsoft products NT OS Kernel Elevation of Privilege Vulnerability | 7.0 |
2024-10-08 | CVE-2024-43570 | Microsoft | Unspecified vulnerability in Microsoft products Windows Kernel Elevation of Privilege Vulnerability | 7.0 |
239 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-10-08 | CVE-2024-43523 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Remote Code Execution Vulnerability | 6.8 |
2024-10-08 | CVE-2024-43524 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Remote Code Execution Vulnerability | 6.8 |
2024-10-08 | CVE-2024-43525 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Remote Code Execution Vulnerability | 6.8 |
2024-10-08 | CVE-2024-43526 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Remote Code Execution Vulnerability | 6.8 |
2024-10-08 | CVE-2024-43536 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Remote Code Execution Vulnerability | 6.8 |
2024-10-08 | CVE-2024-43543 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Remote Code Execution Vulnerability | 6.8 |
2024-10-09 | CVE-2024-39436 | Command Injection vulnerability in Google Android 13.0/14.0 In linkturbonative service, there is a possible command injection due to improper input validation. | 6.7 | |
2024-10-09 | CVE-2024-39437 | Command Injection vulnerability in Google Android 13.0/14.0 In linkturbonative service, there is a possible command injection due to improper input validation. | 6.7 | |
2024-10-09 | CVE-2024-39438 | Command Injection vulnerability in Google Android 13.0/14.0 In linkturbonative service, there is a possible command injection due to improper input validation. | 6.7 | |
2024-10-08 | CVE-2024-37976 | Microsoft | Unspecified vulnerability in Microsoft products Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability | 6.7 |
2024-10-08 | CVE-2024-37983 | Microsoft | Unspecified vulnerability in Microsoft products Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability | 6.7 |
2024-10-08 | CVE-2024-39831 | Openatom | Use After Free vulnerability in Openatom Openharmony in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free. | 6.7 |
2024-10-07 | CVE-2024-23370 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption when a process invokes IOCTL calls from user-space to create a HAB virtual channel and another process invokes IOCTL calls to destroy the same. | 6.7 |
2024-10-07 | CVE-2024-23374 | Qualcomm | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file. | 6.7 |
2024-10-07 | CVE-2024-23375 | Qualcomm | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption during the network scan request. | 6.7 |
2024-10-07 | CVE-2024-23376 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption while sending the persist buffer command packet from the user-space to the kernel space through the IOCTL call. | 6.7 |
2024-10-07 | CVE-2024-23378 | Qualcomm | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption while invoking IOCTL calls for MSM module from the user space during audio playback and record. | 6.7 |
2024-10-07 | CVE-2024-23379 | Qualcomm | Double Free vulnerability in Qualcomm products Memory corruption while unmapping the fastrpc map when two threads can free the same map in concurrent scenario. | 6.7 |
2024-10-08 | CVE-2024-38129 | Microsoft | Unspecified vulnerability in Microsoft Windows Server 2022 23H2 Windows Kerberos Elevation of Privilege Vulnerability | 6.6 |
2024-10-08 | CVE-2024-43480 | Microsoft | Unspecified vulnerability in Microsoft Azure Service Fabric 10.0/10.1/9.1 Azure Service Fabric for Linux Remote Code Execution Vulnerability | 6.6 |
2024-10-12 | CVE-2024-9860 | The Bridge Core plugin for WordPress is vulnerable to unauthorized modification of data or loss of data due to a missing capability check on the 'import_action' and 'install_plugin_per_demo' functions in versions up to, and including, 3.3. | 6.5 | |
2024-10-11 | CVE-2024-39526 | An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved on PTX Series, allows an attacker sending malformed DHCP packets to cause ingress packet processing to stop, leading to a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue only occurs if DHCP snooping is enabled. | 6.5 | |
2024-10-11 | CVE-2024-47493 | A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of the Juniper Networks Junos OS on the MX Series platforms with Trio-based FPCs allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). In case of channelized Modular Interface Cards (MICs), every physical interface flap operation will leak heap memory. | 6.5 | |
2024-10-11 | CVE-2024-47498 | An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). Several configuration statements meant to enforce limits on MAC learning and moves can be configured but do not take effect. | 6.5 | |
2024-10-11 | CVE-2024-47503 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX4600 and SRX5000 Series allows an unauthenticated and logically adjacent attacker to cause a Denial-of-Service (DoS). If in a multicast scenario a sequence of specific PIM packets is received, this will cause a flowd crash and restart, which leads to momentary service interruption. This issue affects Junos OS on SRX 4600 and SRX 5000 Series: * All versions before 21.4R3-S9, * 22.2 versions before 22.2R3-S5, * 22.3 versions before 22.3R3-S4, * 22.4 versions before 22.4R3-S4, * 23.2 versions before 23.2R2-S2, * 23.4 versions before 23.4R2, * 24.2 versions before 24.2R1-S1, 24.2R2. | 6.5 | |
2024-10-11 | CVE-2024-47505 | An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS).When specific SNMP GET operations or specific low-priviledged CLI commands are executed, a GUID resource leak will occur, eventually leading to exhaustion and resulting in FPCs to hang. | 6.5 | |
2024-10-11 | CVE-2024-47508 | An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS).When specific SNMP GET operations or specific low-priviledged CLI commands are executed, a GUID resource leak will occur, eventually leading to exhaustion and resulting in FPCs to hang. | 6.5 | |
2024-10-11 | CVE-2024-47509 | An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS).When specific SNMP GET operations or specific low-priviledged CLI commands are executed, a GUID resource leak will occur, eventually leading to exhaustion and resulting in FPCs to hang. | 6.5 | |
2024-10-11 | CVE-2024-7514 | The WordPress Comments Import & Export plugin for WordPress is vulnerable to to arbitrary file read due to insufficient file path validation during the comments import process, in versions up to, and including, 2.3.7. | 6.5 | |
2024-10-11 | CVE-2024-9586 | The Linkz.ai plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'check_auth' and 'check_logout' functions in versions up to, and including, 1.1.8. | 6.5 | |
2024-10-10 | CVE-2024-47164 | Gradio Project | Path Traversal vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 6.5 |
2024-10-10 | CVE-2024-9808 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Online Eyewear Shop 1.0 A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. | 6.5 |
2024-10-10 | CVE-2024-9809 | Oretnom23 | SQL Injection vulnerability in Oretnom23 Online Eyewear Shop 1.0 A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. | 6.5 |
2024-10-10 | CVE-2024-45118 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. | 6.5 |
2024-10-10 | CVE-2024-45132 | Adobe | Incorrect Authorization vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. | 6.5 |
2024-10-10 | CVE-2024-9623 | Gitlab | Incorrect Authorization vulnerability in Gitlab An issue was discovered in GitLab CE/EE affecting all versions starting from 8.16 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows deploy keys to push to an archived repository. | 6.5 |
2024-10-09 | CVE-2024-47828 | Ampache | Cross-Site Request Forgery (CSRF) vulnerability in Ampache ampache is a web based audio/video streaming application and file manager. | 6.5 |
2024-10-09 | CVE-2024-47833 | Avaiga | Incorrect Permission Assignment for Critical Resource vulnerability in Avaiga Taipy Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. | 6.5 |
2024-10-09 | CVE-2024-9464 | Paloaltonetworks | OS Command Injection vulnerability in Paloaltonetworks Expedition An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. | 6.5 |
2024-10-09 | CVE-2024-9466 | Paloaltonetworks | Cleartext Storage of Sensitive Information vulnerability in Paloaltonetworks Expedition A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials. | 6.5 |
2024-10-09 | CVE-2024-7294 | Progress | Unspecified vulnerability in Progress Telerik Reporting In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), an HTTP DoS attack is possible on anonymous endpoints without rate limiting. | 6.5 |
2024-10-08 | CVE-2024-43534 | Microsoft | Unspecified vulnerability in Microsoft products Windows Graphics Component Information Disclosure Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43537 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Denial of Service Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43538 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Denial of Service Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43540 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Denial of Service Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43542 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Denial of Service Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43555 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Denial of Service Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43557 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Denial of Service Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43558 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Denial of Service Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43559 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Denial of Service Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43561 | Microsoft | Unspecified vulnerability in Microsoft products Windows Mobile Broadband Driver Denial of Service Vulnerability | 6.5 |
2024-10-08 | CVE-2024-43609 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Office Spoofing Vulnerability | 6.5 |
2024-10-08 | CVE-2024-47161 | Jetbrains | Insufficiently Protected Credentials vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.07.3 password could be exposed via Sonar runner REST API | 6.5 |
2024-10-08 | CVE-2024-37179 | SAP | Unrestricted Upload of File with Dangerous Type vulnerability in SAP Businessobjects Business Intelligence 2025/420/430 SAP BusinessObjects Business Intelligence Platform allows an authenticated user to send a specially crafted request to the Web Intelligence Reporting Server to download any file from the machine hosting the service, causing high impact on confidentiality of the application. | 6.5 |
2024-10-07 | CVE-2024-9573 | Soplanning | SQL Injection vulnerability in Soplanning SQL injection vulnerability in SOPlanning <1.45, through /soplanning/www/groupe_list.php, in the by parameter, which could allow a remote user to send a specially crafted query and extract all the information stored on the server. | 6.5 |
2024-10-07 | CVE-2024-9574 | Soplanning | SQL Injection vulnerability in Soplanning SQL injection vulnerability in SOPlanning <1.45, via /soplanning/www/user_groupes.php in the by parameter, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB. | 6.5 |
2024-10-12 | CVE-2024-8915 | The Category Icon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. | 6.4 | |
2024-10-12 | CVE-2024-9595 | The TablePress – Tables in WordPress made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the table cell content in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping. | 6.4 | |
2024-10-12 | CVE-2024-9656 | The Mynx Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 0.27.8 due to insufficient input sanitization and output escaping. | 6.4 | |
2024-10-11 | CVE-2024-9051 | The WP Ultimate Post Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpupg-grid-with-filters shortcode in all versions up to, and including, 3.9.3 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2024-10-11 | CVE-2024-9543 | The PowerPress Podcasting plugin by Blubrry plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'skipto' shortcode in all versions up to, and including, 11.9.18 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2024-10-09 | CVE-2024-9451 | The Embed PDF Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'height' and 'width' parameters in all versions up to, and including, 2.4.4 due to insufficient input sanitization and output escaping. | 6.4 | |
2024-10-09 | CVE-2024-9449 | The Auto iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' parameter in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. | 6.4 | |
2024-10-09 | CVE-2024-7963 | The CMSMasters Content Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's multiple shortcodes in all versions up to, and including, 1.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2024-10-08 | CVE-2024-43513 | Microsoft | Unspecified vulnerability in Microsoft products BitLocker Security Feature Bypass Vulnerability | 6.4 |
2024-10-08 | CVE-2024-8482 | The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 1.3.982 due to insufficient input sanitization and output escaping. | 6.4 | |
2024-10-08 | CVE-2024-8433 | The Easy Mega Menu Plugin for WordPress – ThemeHunk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘themehunk_megamenu_bg_image' parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. | 6.4 | |
2024-10-08 | CVE-2024-8964 | The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 7.2.9 due to insufficient input sanitization and output escaping. | 6.4 | |
2024-10-12 | CVE-2024-9670 | The 2D Tag Cloud plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 6.0.2. | 6.1 | |
2024-10-12 | CVE-2024-9592 | The Easy PayPal Gift Certificate plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. | 6.1 | |
2024-10-11 | CVE-2024-48937 | Znuny | Cross-site Scripting vulnerability in Znuny Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows XSS. | 6.1 |
2024-10-11 | CVE-2024-9211 | The FULL – Cliente plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.22. | 6.1 | |
2024-10-11 | CVE-2024-9221 | The Tainacan plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.21.10. | 6.1 | |
2024-10-11 | CVE-2024-9232 | The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.9.1. | 6.1 | |
2024-10-11 | CVE-2024-9346 | The Embed videos and respect privacy plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'v' parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. | 6.1 | |
2024-10-11 | CVE-2024-9436 | The PublishPress Revisions: Duplicate Posts, Submit, Approve and Schedule Content Changes plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.5.14. | 6.1 | |
2024-10-11 | CVE-2024-9610 | The Language Switcher plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.7.13. | 6.1 | |
2024-10-11 | CVE-2024-9611 | The Increase upload file size & Maximum Execution Time limit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0. | 6.1 | |
2024-10-11 | CVE-2024-9616 | The BlockMeister – Block Pattern Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.10. | 6.1 | |
2024-10-10 | CVE-2024-9810 | Jkev | Cross-site Scripting vulnerability in Jkev Record Management System 1.0 A vulnerability was found in SourceCodester Record Management System 1.0. | 6.1 |
2024-10-10 | CVE-2024-47648 | Theeventprime | Open Redirect vulnerability in Theeventprime Eventprime URL Redirection to Untrusted Site ('Open Redirect') vulnerability in EventPrime Events EventPrime.This issue affects EventPrime: from n/a through 4.0.4.5. | 6.1 |
2024-10-10 | CVE-2024-9799 | Rems | Cross-site Scripting vulnerability in Rems Profile Registration Without Reload/Refresh 1.0 A vulnerability has been found in SourceCodester Profile Registration without Reload Refresh 1.0 and classified as problematic. | 6.1 |
2024-10-10 | CVE-2024-9792 | Dlink | Cross-site Scripting vulnerability in Dlink Dsl-2750U Firmware R5B017 A vulnerability classified as problematic has been found in D-Link DSL-2750U R5B017. | 6.1 |
2024-10-10 | CVE-2024-45123 | Adobe | Cross-site Scripting vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. | 6.1 |
2024-10-10 | CVE-2024-8729 | Idiom | Cross-site Scripting vulnerability in Idiom Easy Social Share Buttons The Easy Social Share Buttons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.4.5. | 6.1 |
2024-10-10 | CVE-2024-9205 | Wpfactory | Cross-site Scripting vulnerability in Wpfactory Maximum products PER User for Woocommerce The Maximum Products per User for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.2.8. | 6.1 |
2024-10-10 | CVE-2024-9377 | Wpfactory | Cross-site Scripting vulnerability in Wpfactory Products, Order & Customers Export for Woocommerce The Products, Order & Customers Export for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0.15. | 6.1 |
2024-10-09 | CVE-2024-48933 | Lemonldap NG | Cross-site Scripting vulnerability in Lemonldap-Ng Lemonldap::Ng A cross-site scripting (XSS) vulnerability in LemonLDAP::NG before 2.19.3 allows remote attackers to inject arbitrary web script or HTML into the login page via a username if userControl has been set to a non-default value that allows special HTML characters. | 6.1 |
2024-10-09 | CVE-2024-9467 | Paloaltonetworks | Cross-site Scripting vulnerability in Paloaltonetworks Expedition A reflected XSS vulnerability in Palo Alto Networks Expedition enables execution of malicious JavaScript in the context of an authenticated Expedition user's browser if that user clicks on a malicious link, allowing phishing attacks that could lead to Expedition browser session theft. | 6.1 |
2024-10-08 | CVE-2024-9207 | The BuddyPress Docs plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.2.3. | 6.1 | |
2024-10-08 | CVE-2024-8629 | The WooCommerce Multilingual & Multicurrency with WPML plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.3.7. | 6.1 | |
2024-10-07 | CVE-2024-47781 | Miraheze | Cross-site Scripting vulnerability in Miraheze Createwiki 20220402 CreateWiki is an extension used at Miraheze for requesting & creating wikis. | 6.1 |
2024-10-07 | CVE-2024-45060 | Phpoffice | Cross-site Scripting vulnerability in PHPoffice PHPspreadsheet PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. | 6.1 |
2024-10-07 | CVE-2024-47772 | Discourse | Cross-site Scripting vulnerability in Discourse Discourse is an open source platform for community discussion. | 6.1 |
2024-10-07 | CVE-2024-46300 | Angeljudesuarez | Cross-site Scripting vulnerability in Angeljudesuarez Placement Management System 1.0 itsourcecode Placement Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via the Full Name field in registration.php. | 6.1 |
2024-10-07 | CVE-2024-28709 | Limesurvey | Cross-site Scripting vulnerability in Limesurvey Cross Site Scripting vulnerability in LimeSurvey before 6.5.12+240611 allows a remote attacker to execute arbitrary code via a crafted script to the title and comment fields. | 6.1 |
2024-10-07 | CVE-2024-28710 | Limesurvey | Cross-site Scripting vulnerability in Limesurvey Cross Site Scripting vulnerability in LimeSurvey before 6.5.0+240319 allows a remote attacker to execute arbitrary code via a lack of input validation and output encoding in the Alert Widget's message component. | 6.1 |
2024-10-07 | CVE-2024-38425 | Qualcomm | Incorrect Authorization vulnerability in Qualcomm products Information disclosure while sending implicit broadcast containing APP launch information. | 6.1 |
2024-10-11 | CVE-2024-47491 | An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS). When a BGP UPDATE with malformed path attribute is received over an established BGP session, rpd crashes and restarts. | 5.9 | |
2024-10-11 | CVE-2024-47494 | A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the AgentD process of Juniper Networks Junos OS allows an attacker who is already causing impact to established sessions which generates counter changes picked up by the AgentD process during telemetry polling, to move the AgentD process into a state where AgentD attempts to reap an already destroyed sensor. | 5.9 | |
2024-10-11 | CVE-2024-47506 | A Deadlock vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a large amount of traffic is processed by ATP Cloud inspection, a deadlock can occur which will result in a PFE crash and restart. | 5.9 | |
2024-10-10 | CVE-2024-48942 | Syracom | Unspecified vulnerability in Syracom Secure Login 3.1.1.0 The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to easily brute-force the 2FA PIN via the plugins/servlet/twofactor/public/pinvalidation endpoint. | 5.9 |
2024-10-08 | CVE-2024-43547 | Microsoft | Unspecified vulnerability in Microsoft products Windows Kerberos Information Disclosure Vulnerability | 5.9 |
2024-10-11 | CVE-2024-47507 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an integrity impact to the downstream devices. When a peer sends a BGP update message which contains the aggregator attribute with an ASN value of zero (0), rpd accepts and propagates this attribute, which can cause issues for downstream BGP peers receiving this. This issue affects: Junos OS: * All versions before 21.4R3-S6, * 22.2 versions before 22.2R3-S3, * 22.4 versions before 22.4R3; Junos OS Evolved: * All versions before 21.4R3-S7-EVO, * 22.2 versions before 22.2R3-S4-EVO, * 22.4 versions before 22.4R3-EVO. | 5.8 | |
2024-10-11 | CVE-2024-47830 | Plane | Server-Side Request Forgery (SSRF) vulnerability in Plane Plane is an open-source project management tool. | 5.8 |
2024-10-09 | CVE-2024-30118 | Hcltech | Unspecified vulnerability in Hcltech Connections 7.0/8.0 HCL Connections is vulnerable to an information disclosure vulnerability which could allow a user to obtain sensitive information they are not entitled to because of improperly handling the request data. | 5.7 |
2024-10-08 | CVE-2024-43546 | Microsoft | Unspecified vulnerability in Microsoft products Windows Cryptographic Information Disclosure Vulnerability | 5.6 |
2024-10-11 | CVE-2024-44157 | Apple | Out-of-bounds Write vulnerability in Apple TV and Itunes A stack buffer overflow was addressed through improved input validation. | 5.5 |
2024-10-11 | CVE-2024-39527 | An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of protected files on the file system. Through the execution of crafted CLI commands, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. | 5.5 | |
2024-10-11 | CVE-2024-47496 | A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS allows a local, low-privileged attacker to cause a Denial-of-Service (DoS). When a specific command is executed, the pfe crashes. This will cause traffic forwarding to be interrupted until the system self-recovers. | 5.5 | |
2024-10-11 | CVE-2024-47501 | A NULL Pointer Dereference vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). In a VPLS or Junos Fusion scenario, the execution of specific show commands will cause all FPCs hosting VPLS sessions or connecting to satellites to crash and restart. This issue affects Junos on MX304, MX with MPC10/11/LC9600 and EX9200 with EX9200-15C: * All version before 21.2R3-S1, * 21.3 versions before 21.3R3, * 21.4 versions before 21.4R2. | 5.5 | |
2024-10-11 | CVE-2024-5474 | Lenovo | Incorrect Default Permissions vulnerability in Lenovo Dolby Vision Provisioning A potential information disclosure vulnerability was reported in Lenovo's packaging of Dolby Vision Provisioning software prior to version 2.0.0.2 that could allow a local attacker to read files on the system with elevated privileges during installation of the package. | 5.5 |
2024-10-10 | CVE-2024-9780 | Wireshark | Missing Initialization of Resource vulnerability in Wireshark 4.4.0 ITS dissector crash in Wireshark 4.4.0 allows denial of service via packet injection or crafted capture file | 5.5 |
2024-10-09 | CVE-2024-8264 | Fortra | Information Exposure Through Log Files vulnerability in Fortra Robot Schedule Fortra's Robot Schedule Enterprise Agent prior to version 3.05 writes FTP username and password information to the agent log file when detailed logging is enabled. | 5.5 |
2024-10-09 | CVE-2024-9469 | Paloaltonetworks | Improper Check for Unusual or Exceptional Conditions vulnerability in Paloaltonetworks Cortex XDR Agent A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. | 5.5 |
2024-10-09 | CVE-2024-47661 | Linux | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid overflow from uint32_t to uint8_t [WHAT & HOW] dmub_rb_cmd's ramping_boundary has size of uint8_t and it is assigned 0xFFFF. | 5.5 |
2024-10-09 | CVE-2024-47662 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection [Why] These registers should not be read from driver and triggering the security violation when DMCUB work times out and diagnostics are collected blocks Z8 entry. [How] Remove the register read from DCN35. | 5.5 |
2024-10-09 | CVE-2024-47663 | Linux | Divide By Zero vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: staging: iio: frequency: ad9834: Validate frequency parameter value In ad9834_write_frequency() clk_get_rate() can return 0. | 5.5 |
2024-10-09 | CVE-2024-47664 | Linux | Divide By Zero vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware If the value of max_speed_hz is 0, it may cause a division by zero error in hisi_calc_effective_speed(). The value of max_speed_hz is provided by firmware. Firmware is generally considered as a trusted domain. | 5.5 |
2024-10-09 | CVE-2024-47665 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup Definitely condition dma_get_cache_alignment * defined value > 256 during driver initialization is not reason to BUG_ON(). | 5.5 |
2024-10-09 | CVE-2024-47666 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Set phy->enable_completion only when we wait for it pm8001_phy_control() populates the enable_completion pointer with a stack address, sends a PHY_LINK_RESET / PHY_HARD_RESET, waits 300 ms, and returns. | 5.5 |
2024-10-09 | CVE-2024-47667 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0 (SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an inbound PCIe TLP spans more than two internal AXI 128-byte bursts, the bus may corrupt the packet payload and the corrupt data may cause associated applications or the processor to hang. The workaround for Errata #i2037 is to limit the maximum read request size and maximum payload size to 128 bytes. | 5.5 |
2024-10-09 | CVE-2024-47669 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix state management in error path of log writing function After commit a694291a6211 ("nilfs2: separate wait function from nilfs_segctor_write") was applied, the log writing function nilfs_segctor_do_construct() was able to issue I/O requests continuously even if user data blocks were split into multiple logs across segments, but two potential flaws were introduced in its error handling. First, if nilfs_segctor_begin_construction() fails while creating the second or subsequent logs, the log writing function returns without calling nilfs_segctor_abort_construction(), so the writeback flag set on pages/folios will remain uncleared. | 5.5 |
2024-10-09 | CVE-2024-47671 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: USB: usbtmc: prevent kernel-usb-infoleak The syzbot reported a kernel-usb-infoleak in usbtmc_write, we need to clear the structure before filling fields. | 5.5 |
2024-10-09 | CVE-2024-47672 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead There is a WARNING in iwl_trans_wait_tx_queues_empty() (that was recently converted from just a message), that can be hit if we wait for TX queues to become empty after firmware died. | 5.5 |
2024-10-09 | CVE-2024-47673 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped Not doing so will make us send a host command to the transport while the firmware is not alive, which will trigger a WARNING. bad state = 0 WARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] RIP: 0010:iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] Call Trace: <TASK> iwl_mvm_send_cmd+0x40/0xc0 [iwlmvm] iwl_mvm_config_scan+0x198/0x260 [iwlmvm] iwl_mvm_recalc_tcm+0x730/0x11d0 [iwlmvm] iwl_mvm_tcm_work+0x1d/0x30 [iwlmvm] process_one_work+0x29e/0x640 worker_thread+0x2df/0x690 ? rescuer_thread+0x540/0x540 kthread+0x192/0x1e0 ? set_kthread_struct+0x90/0x90 ret_from_fork+0x22/0x30 | 5.5 |
2024-10-09 | CVE-2024-47658 | Linux | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: crypto: stm32/cryp - call finalize with bh disabled The finalize operation in interrupt mode produce a produces a spinlock recursion warning. | 5.5 |
2024-10-09 | CVE-2024-45145 | Adobe | Out-of-bounds Read vulnerability in Adobe Lightroom Lightroom Desktop versions 7.4.1, 13.5, 12.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. | 5.5 |
2024-10-09 | CVE-2024-47419 | Adobe | Out-of-bounds Read vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. | 5.5 |
2024-10-09 | CVE-2024-47420 | Adobe | Out-of-bounds Read vulnerability in Adobe Animate Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. | 5.5 |
2024-10-09 | CVE-2024-20787 | Adobe | Out-of-bounds Read vulnerability in Adobe Substance 3D Painter Substance3D - Painter versions 10.0.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. | 5.5 |
2024-10-08 | CVE-2024-43500 | Microsoft | Unspecified vulnerability in Microsoft products Windows Resilient File System (ReFS) Information Disclosure Vulnerability | 5.5 |
2024-10-08 | CVE-2024-43508 | Microsoft | Unspecified vulnerability in Microsoft products Windows Graphics Component Information Disclosure Vulnerability | 5.5 |
2024-10-08 | CVE-2024-43554 | Microsoft | Unspecified vulnerability in Microsoft products Windows Kernel-Mode Driver Information Disclosure Vulnerability | 5.5 |
2024-10-08 | CVE-2024-43585 | Microsoft | Unspecified vulnerability in Microsoft products Code Integrity Guard Security Feature Bypass Vulnerability | 5.5 |
2024-10-08 | CVE-2024-43603 | Microsoft | Unspecified vulnerability in Microsoft products Visual Studio Collector Service Denial of Service Vulnerability | 5.5 |
2024-10-08 | CVE-2024-43614 | Microsoft | Unspecified vulnerability in Microsoft Defender for Endpoint Microsoft Defender for Endpoint for Linux Spoofing Vulnerability | 5.5 |
2024-10-08 | CVE-2024-39806 | Openatom | Out-of-bounds Read vulnerability in Openatom Openharmony in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read. | 5.5 |
2024-10-08 | CVE-2024-43696 | Openatom | Memory Leak vulnerability in Openatom Openharmony in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak. | 5.5 |
2024-10-08 | CVE-2024-43697 | Openatom | Unspecified vulnerability in Openatom Openharmony in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input. | 5.5 |
2024-10-08 | CVE-2024-45382 | Openatom | Out-of-bounds Write vulnerability in Openatom Openharmony in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write. | 5.5 |
2024-10-13 | CVE-2024-9906 | Oretnom23 | Cross-site Scripting vulnerability in Oretnom23 Online Eyewear Shop 1.0 A vulnerability, which was classified as problematic, was found in SourceCodester Online Eyewear Shop 1.0. | 5.4 |
2024-10-12 | CVE-2024-9696 | Rescuethemes | Cross-site Scripting vulnerability in Rescuethemes Rescue Shortcodes The Rescue Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'rescue_tab' shortcode in all versions up to, and including, 2.8 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-10-12 | CVE-2024-9704 | Ibericode | Cross-site Scripting vulnerability in Ibericode Social Sharing The Social Sharing (by Danny) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'dvk_social_sharing' shortcode in all versions up to, and including, 1.3.7 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-10-11 | CVE-2024-39534 | An Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast address of the subnet assigned to an interface. | 5.4 | |
2024-10-11 | CVE-2024-9587 | The Linkz.ai plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_linkz' function in versions up to, and including, 1.1.8. | 5.4 | |
2024-10-10 | CVE-2024-47872 | Gradio Project | Cross-site Scripting vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 5.4 |
2024-10-10 | CVE-2024-47165 | Gradio Project | Unspecified vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 5.4 |
2024-10-10 | CVE-2024-9805 | Code Projects | Cross-site Scripting vulnerability in Code-Projects Blood Bank System 1.0 A vulnerability was found in code-projects Blood Bank System 1.0. | 5.4 |
2024-10-10 | CVE-2024-9803 | Code Projects | Cross-site Scripting vulnerability in Code-Projects Blood Bank System 1.0 A vulnerability was found in code-projects Blood Bank Management System 1.0. | 5.4 |
2024-10-10 | CVE-2024-6530 | Gitlab | Cross-site Scripting vulnerability in Gitlab A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. | 5.4 |
2024-10-10 | CVE-2024-48902 | Jetbrains | Missing Authorization vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2024.3.46677 improper access control allowed users with project update permission to delete applications via API | 5.4 |
2024-10-10 | CVE-2024-45128 | Adobe | Incorrect Authorization vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. | 5.4 |
2024-10-10 | CVE-2024-45131 | Adobe | Incorrect Authorization vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. | 5.4 |
2024-10-10 | CVE-2024-7049 | Openwebui | Unspecified vulnerability in Openwebui Open Webui 0.3.8 In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. | 5.4 |
2024-10-10 | CVE-2024-9074 | Essamamdani | Cross-site Scripting vulnerability in Essamamdani Advanced Blocks PRO The Advanced Blocks Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. | 5.4 |
2024-10-10 | CVE-2024-9520 | Wpuserplus | Missing Authorization vulnerability in Wpuserplus Userplus 1.0/1.1/2.0 The UserPlus plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.0. | 5.4 |
2024-10-10 | CVE-2024-8987 | Kainelabs | Cross-site Scripting vulnerability in Kainelabs Youzify The Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's youzify_media shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2024-10-10 | CVE-2024-9057 | Curator | Cross-site Scripting vulnerability in Curator Curator.Io The Curator.io: Show all your social media posts in a beautiful feed. | 5.4 |
2024-10-10 | CVE-2024-9064 | Namogo | Cross-site Scripting vulnerability in Namogo Elementor Inline SVG The Elementor Inline SVG plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping. | 5.4 |
2024-10-10 | CVE-2024-9066 | Secretlab | Cross-site Scripting vulnerability in Secretlab Marketing and SEO Booster The Marketing and SEO Booster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.9.10 due to insufficient input sanitization and output escaping. | 5.4 |
2024-10-10 | CVE-2024-9072 | Gdpr Extensions | Cross-site Scripting vulnerability in Gdpr-Extensions Consent Manager The GDPR-Extensions-com – Consent Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. | 5.4 |
2024-10-10 | CVE-2024-9457 | Cssjockey | Cross-site Scripting vulnerability in Cssjockey WP Builder 3.0.7 The WP Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.7 due to insufficient input sanitization and output escaping. | 5.4 |
2024-10-10 | CVE-2024-48941 | Syracom | Unspecified vulnerability in Syracom Secure Login 3.1.1.0 The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to bypass 2FA by interacting with the /rest endpoint of Jira, Confluence, or Bitbucket. | 5.4 |
2024-10-09 | CVE-2024-46237 | Phpgurukul | Cross-site Scripting vulnerability in PHPgurukul Hospital Management System 4.0 PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site Scripting (XSS) via the patname, pataddress, and medhis parameters in doctor/add-patient.php and doctor/edit-patient.php. | 5.4 |
2024-10-08 | CVE-2024-47950 | Jetbrains | Cross-site Scripting vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.07.3 stored XSS was possible in Backup configuration settings | 5.4 |
2024-10-08 | CVE-2024-47951 | Jetbrains | Cross-site Scripting vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.07.3 stored XSS was possible via server global settings | 5.4 |
2024-10-08 | CVE-2024-45278 | SAP | Cross-site Scripting vulnerability in SAP Commerce Backoffice 2205/2211 SAP Commerce Backoffice does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | 5.4 |
2024-10-08 | CVE-2024-47594 | SAP | Cross-site Scripting vulnerability in SAP Netweaver Enterprise Portal 7.50 SAP NetWeaver Enterprise Portal (KMC) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability in KMC servlet. | 5.4 |
2024-10-07 | CVE-2024-47782 | Miraheze | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Miraheze Wikidiscover 20240208 WikiDiscover is an extension designed for use with a CreateWiki managed farm to display wikis. | 5.4 |
2024-10-07 | CVE-2024-43362 | Cacti | Cross-site Scripting vulnerability in Cacti Cacti is an open source performance and fault management framework. | 5.4 |
2024-10-07 | CVE-2024-9571 | Soplanning | Cross-site Scripting vulnerability in Soplanning Cross-Site Scripting (XSS) vulnerability in SOPlanning <1.45, due to lack of proper validation of user input via /soplanning/www/process/xajax_server.php, affecting multiple parameters. | 5.4 |
2024-10-07 | CVE-2024-9572 | Soplanning | Cross-site Scripting vulnerability in Soplanning Cross-Site Scripting (XSS) vulnerability in SOPlanning <1.45, due to lack of proper validation of user input via /soplanning/www/process/groupe_save.php, in the groupe_id parameter. | 5.4 |
2024-10-07 | CVE-2024-45153 | Adobe | Cross-site Scripting vulnerability in Adobe Experience Manager Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. | 5.4 |
2024-10-12 | CVE-2024-8760 | The Stackable – Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to CSS Injection in all versions up to, and including, 3.13.6. | 5.3 | |
2024-10-10 | CVE-2024-47166 | Gradio Project | Path Traversal vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 5.3 |
2024-10-10 | CVE-2024-9787 | Ccontrols | Unspecified vulnerability in Ccontrols Basrouter Bacnet Basrt-B Firmware 2.7.2 A vulnerability, which was classified as problematic, was found in Contemporary Control System BASrouter BACnet BASRT-B 2.7.2. | 5.3 |
2024-10-10 | CVE-2024-45124 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. | 5.3 |
2024-10-10 | CVE-2024-9596 | Gitlab | Unspecified vulnerability in Gitlab An issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. | 5.3 |
2024-10-10 | CVE-2024-9798 | Linuxfoundation | Cleartext Storage of Sensitive Information vulnerability in Linuxfoundation Zowe API Mediation Layer The health endpoint is public so everybody can see a list of all services. | 5.3 |
2024-10-10 | CVE-2024-9802 | Linuxfoundation | Cleartext Storage of Sensitive Information vulnerability in Linuxfoundation Zowe API Mediation Layer The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. | 5.3 |
2024-10-10 | CVE-2024-8513 | Quarka | Missing Authorization vulnerability in Quarka QA Analytics The QA Analytics – Web Analytics Tool with Heatmaps & Session Replay Across All Pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_save_plugin_config() function in all versions up to, and including, 4.1.0.0. | 5.3 |
2024-10-10 | CVE-2024-9065 | Matbao | Missing Authorization vulnerability in Matbao WP Helper Premium The WP Helper Premium plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'whp_smtp_send_mail_test' function in all versions up to, and including, 4.6.1. | 5.3 |
2024-10-08 | CVE-2024-9620 | A flaw was found in Event-Driven Automation (EDA) in Ansible Automation Platform (AAP), which lacks encryption of sensitive information. | 5.3 | |
2024-10-08 | CVE-2024-9622 | A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. | 5.3 | |
2024-10-08 | CVE-2024-45231 | Djangoproject | Unspecified vulnerability in Djangoproject Django An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. | 5.3 |
2024-10-08 | CVE-2022-4534 | The Limit Login Attempts (Spam Protection) plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 5.3. | 5.3 | |
2024-10-08 | CVE-2024-47563 | Siemens | Path Traversal vulnerability in Siemens Sinec Security Monitor A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). | 5.3 |
2024-10-08 | CVE-2024-45282 | SAP | Trusting HTTP Permission Methods on the Server Side vulnerability in SAP S/4 Hana Fields which are in 'read only' state in Bank Statement Draft in Manage Bank Statements application, could be modified by MERGE method. | 5.3 |
2024-10-08 | CVE-2024-8925 | PHP FPM | Unspecified vulnerability in PHP-Fpm In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. | 5.3 |
2024-10-11 | CVE-2024-39544 | An Incorrect Default Permissions vulnerability in the command line interface (CLI) of Juniper Networks Junos OS Evolved allows a low privileged local attacker to view NETCONF traceoptions files, representing an exposure of sensitive information. On all Junos OS Evolved platforms, when NETCONF traceoptions are configured, NETCONF traceoptions files get created with an incorrect group permission, which allows a low-privileged user can access sensitive information compromising the confidentiality of the system. Junos OS Evolved: * All versions before 20.4R3-S9-EVO, * 21.2-EVO before 21.2R3-S7-EVO, * 21.4-EVO before 21.4R3-S5-EVO, * 22.1-EVO before 22.1R3-S5-EVO, * 22.2-EVO before 22.2R3-S3-EVO, * 22.3-EVO before 22.3R3-EVO, 22.3R3-S2-EVO, * 22.4-EVO before 22.4R3-EVO, * 23.2-EVO before 23.2R1-S2-EVO, 23.2R2-EVO. | 5.0 | |
2024-10-08 | CVE-2024-43520 | Microsoft | Unspecified vulnerability in Microsoft products Windows Kernel Denial of Service Vulnerability | 5.0 |
2024-10-13 | CVE-2024-9917 | Usualtool | Deserialization of Untrusted Data vulnerability in Usualtool Usualtoolcms 9.0 A vulnerability, which was classified as critical, was found in HuangDou UTCMS V9. | 4.9 |
2024-10-10 | CVE-2024-9804 | Code Projects | SQL Injection vulnerability in Code-Projects Blood Bank System 1.0 A vulnerability was found in code-projects Blood Bank System 1.0. | 4.9 |
2024-10-10 | CVE-2024-45119 | Adobe | Server-Side Request Forgery (SSRF) vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. | 4.9 |
2024-10-07 | CVE-2024-20102 | Out-of-bounds Read vulnerability in Google Android 13.0/14.0 In wlan driver, there is a possible out of bounds read due to improper input validation. | 4.9 | |
2024-10-12 | CVE-2024-9776 | Getbutterfly | Cross-site Scripting vulnerability in Getbutterfly Imagepress The ImagePress – Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping. | 4.8 |
2024-10-10 | CVE-2024-9806 | Classroombookings | Cross-site Scripting vulnerability in Classroombookings 2.8.6 A vulnerability has been found in Craig Rodway Classroombookings up to 2.8.6 and classified as problematic. | 4.8 |
2024-10-10 | CVE-2024-9807 | Classroombookings | Cross-site Scripting vulnerability in Classroombookings 2.8.7 A vulnerability was found in Craig Rodway Classroombookings 2.8.7 and classified as problematic. | 4.8 |
2024-10-10 | CVE-2024-45127 | Adobe | Cross-site Scripting vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an admin attacker to inject malicious scripts into vulnerable form fields. | 4.8 |
2024-10-07 | CVE-2024-45932 | Webkul | Cross-site Scripting vulnerability in Webkul Krayin CRM 1.3.0 Krayin CRM v1.3.0 is vulnerable to Cross Site Scripting (XSS) via the organization name field in /admin/contacts/organizations/edit/2. | 4.8 |
2024-10-09 | CVE-2024-9471 | Paloaltonetworks | Unspecified vulnerability in Paloaltonetworks Pan-Os A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. | 4.7 |
2024-10-09 | CVE-2024-47668 | Linux | Race Condition vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() If we need to increase the tree depth, allocate a new node, and then race with another thread that increased the tree depth before us, we'll still have a preallocated node that might be used later. If we then use that node for a new non-root node, it'll still have a pointer to the old root instead of being zeroed - fix this by zeroing it in the cmpxchg failure path. | 4.7 |
2024-10-09 | CVE-2024-46870 | Linux | Race Condition vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Disable DMCUB timeout for DCN35 [Why] DMCUB can intermittently take longer than expected to process commands. Old ASIC policy was to continue while logging a diagnostic error - which works fine for ASIC without IPS, but with IPS this could lead to a race condition where we attempt to access DCN state while it's inaccessible, leading to a system hang when the NIU port is not disabled or register accesses that timeout and the display configuration in an undefined state. [How] We need to investigate why these accesses take longer than expected, but for now we should disable the timeout on DCN35 to avoid this race condition. | 4.7 |
2024-10-09 | CVE-2024-47660 | Linux | Race Condition vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: fsnotify: clear PARENT_WATCHED flags lazily In some setups directories can have many (usually negative) dentries. Hence __fsnotify_update_child_dentry_flags() function can take a significant amount of time. | 4.7 |
2024-10-08 | CVE-2024-43612 | Microsoft | Unspecified vulnerability in Microsoft Power BI Report Server Power BI Report Server Spoofing Vulnerability | 4.7 |
2024-10-12 | CVE-2024-7489 | The Forms for Mailchimp by Optin Cat – Grow Your MailChimp List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form color parameters in all versions up to, and including, 2.5.6 due to insufficient input sanitization and output escaping. | 4.4 | |
2024-10-11 | CVE-2024-6985 | Lollms | Relative Path Traversal vulnerability in Lollms A path traversal vulnerability exists in the api open_personality_folder endpoint of parisneo/lollms-webui. | 4.4 |
2024-10-09 | CVE-2024-39439 | Out-of-bounds Write vulnerability in Google Android 13.0/14.0 In DRM service, there is a possible out of bounds write due to a missing bounds check. | 4.4 | |
2024-10-09 | CVE-2024-39440 | NULL Pointer Dereference vulnerability in Google Android 13.0/14.0 In DRM service, there is a possible system crash due to null pointer dereference. | 4.4 | |
2024-10-07 | CVE-2024-20091 | Out-of-bounds Read vulnerability in Google Android 12.0 In vdec, there is a possible out of bounds read due to a missing bounds check. | 4.4 | |
2024-10-07 | CVE-2024-20093 | Out-of-bounds Read vulnerability in Google Android 12.0 In vdec, there is a possible out of bounds read due to a missing bounds check. | 4.4 | |
2024-10-07 | CVE-2024-20095 | Out-of-bounds Read vulnerability in Google Android In m4u, there is a possible out of bounds read due to a missing bounds check. | 4.4 | |
2024-10-07 | CVE-2024-20096 | Out-of-bounds Read vulnerability in Google Android In m4u, there is a possible out of bounds read due to a missing bounds check. | 4.4 | |
2024-10-07 | CVE-2024-20097 | Out-of-bounds Read vulnerability in Google Android 12.0 In vdec, there is a possible out of bounds read due to a missing bounds check. | 4.4 | |
2024-10-12 | CVE-2024-9756 | Directsoftware | Missing Authorization vulnerability in Directsoftware Order Attachments for Woocommerce The Order Attachments for WooCommerce plugin for WordPress is vulnerable to unauthorized limited arbitrary file uploads due to a missing capability check on the wcoa_add_attachment AJAX action in versions 2.0 to 2.4.1. | 4.3 |
2024-10-12 | CVE-2024-9187 | The Read more By Adam plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the deleteRm() function in all versions up to, and including, 1.1.8. | 4.3 | |
2024-10-12 | CVE-2024-9778 | Getbutterfly | Cross-Site Request Forgery (CSRF) vulnerability in Getbutterfly Imagepress The ImagePress – Image Gallery plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.2. | 4.3 |
2024-10-12 | CVE-2024-9824 | The ImagePress – Image Gallery plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'ip_delete_post' and 'ip_update_post_title' functions in all versions up to, and including, 1.2.2. | 4.3 | |
2024-10-11 | CVE-2024-9539 | Github | Unspecified vulnerability in Github Enterprise Server An information disclosure vulnerability was identified in GitHub Enterprise Server via attacker uploaded asset URL allowing the attacker to retrieve metadata information of a user who clicks on the URL and further exploit it to create a convincing phishing page. | 4.3 |
2024-10-11 | CVE-2024-25622 | Dena | Always-Incorrect Control Flow Implementation vulnerability in Dena H2O h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. | 4.3 |
2024-10-11 | CVE-2024-5005 | Gitlab | Unspecified vulnerability in Gitlab An issue has been discovered discovered in GitLab EE/CE affecting all versions starting from 11.4 before 17.2.9, all versions starting from 17.3 before 17.3.5, all versions starting from 17.4 before 17.4.2 It was possible for guest users to disclose project templates using the API. | 4.3 |
2024-10-11 | CVE-2024-8913 | The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.6.11 via the render function in modules/widgets/tp_accordion.php. | 4.3 | |
2024-10-11 | CVE-2024-9538 | The ShopLentor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.8 via the 'render' function in includes/addons/wl_faq.php. | 4.3 | |
2024-10-10 | CVE-2024-47168 | Gradio Project | Always-Incorrect Control Flow Implementation vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 4.3 |
2024-10-10 | CVE-2024-45121 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. | 4.3 |
2024-10-10 | CVE-2024-45122 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. | 4.3 |
2024-10-10 | CVE-2024-45125 | Adobe | Incorrect Authorization vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. | 4.3 |
2024-10-10 | CVE-2024-45129 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in Privilege escalation. | 4.3 |
2024-10-10 | CVE-2024-45130 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. | 4.3 |
2024-10-10 | CVE-2024-8477 | Brevo | Cross-Site Request Forgery (CSRF) vulnerability in Brevo Newsletter, Smtp, Email Marketing and Subscribe The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.87. | 4.3 |
2024-10-10 | CVE-2024-9067 | Kainelabs | Missing Authorization vulnerability in Kainelabs Youzify The Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'delete_attachment' function in all versions up to, and including, 1.3.0. | 4.3 |
2024-10-10 | CVE-2024-9685 | Andreamarinucci | Missing Authorization vulnerability in Andreamarinucci Notification for Telegram The Notification for Telegram plugin for WordPress is vulnerable to unauthorized test message sending due to a missing capability check on the 'nftb_test_action' function in versions up to, and including, 3.3.1. | 4.3 |
2024-10-09 | CVE-2024-39586 | Dell | XXE vulnerability in Dell EMC Appsync Dell AppSync Server, version 4.3 through 4.6, contains an XML External Entity Injection vulnerability. | 4.3 |
2024-10-08 | CVE-2024-8431 | The Photo Gallery, Images, Slider in Rbs Image Gallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajaxGetGalleryJson() function in all versions up to, and including, 3.2.21. | 4.3 | |
2024-10-08 | CVE-2024-47565 | Siemens | Unspecified vulnerability in Siemens Sinec Security Monitor A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). | 4.3 |
2024-10-08 | CVE-2024-45277 | SAP | Unspecified vulnerability in SAP Hana-Client The SAP HANA Node.js client package versions from 2.0.0 before 2.21.31 is impacted by Prototype Pollution vulnerability allowing an attacker to add arbitrary properties to global object prototypes. | 4.3 |
2024-10-07 | CVE-2024-43789 | Discourse | Unspecified vulnerability in Discourse Discourse is an open source platform for community discussion. | 4.3 |
2024-10-07 | CVE-2024-45297 | Discourse | Unspecified vulnerability in Discourse Discourse is an open source platform for community discussion. | 4.3 |
9 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-10-10 | CVE-2024-47869 | Gradio Project | Information Exposure Through Discrepancy vulnerability in Gradio Project Gradio Gradio is an open-source Python package designed for quick prototyping. | 3.7 |
2024-10-08 | CVE-2024-45476 | Siemens | Unspecified vulnerability in Siemens Tecnomatix Plant Simulation A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 3.3 |
2024-10-08 | CVE-2024-9026 | PHP FPM | Unspecified vulnerability in PHP-Fpm In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. | 3.3 |
2024-10-10 | CVE-2024-45120 | Adobe | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to a security feature bypass. | 3.1 |
2024-10-10 | CVE-2024-45133 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. | 2.7 |
2024-10-10 | CVE-2024-45134 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. | 2.7 |
2024-10-10 | CVE-2024-45135 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. | 2.7 |
2024-10-10 | CVE-2024-45149 | Adobe | Unspecified vulnerability in Adobe Commerce and Magento Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. | 2.7 |
2024-10-09 | CVE-2024-7038 | Openwebui | Information Exposure Through an Error Message vulnerability in Openwebui Open Webui An information disclosure vulnerability exists in open-webui version 0.3.8. | 2.7 |