Weekly Vulnerabilities Reports > December 9 to 15, 2024
Overview
552 new vulnerabilities reported during this period, including 47 critical vulnerabilities and 171 high severity vulnerabilities. This weekly summary report vulnerabilities in 110 products from 47 vendors including Adobe, Apple, Gstreamer Project, Huawei, and Dell. Vulnerabilities are notably categorized as "Cross-site Scripting", "Out-of-bounds Write", "Missing Authorization", "Out-of-bounds Read", and "SQL Injection".
- 427 reported vulnerabilities are remotely exploitables.
- 253 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 257 reported vulnerabilities are exploitable by an anonymous user.
- Adobe has the most reported vulnerabilities, with 162 reported vulnerabilities.
- Gstreamer Project has the most reported critical vulnerabilities, with 16 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
47 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-12-14 | CVE-2024-11715 | Wpjobportal | Missing Authorization vulnerability in Wpjobportal WP JOB Portal The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the assignUserRole() function in all versions up to, and including, 2.2.2. | 9.8 |
2024-12-13 | CVE-2024-55956 | Cleo | Command Injection vulnerability in Cleo Harmony, Lexicom and Vltrader In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory. | 9.8 |
2024-12-13 | CVE-2022-45806 | Strategy11 | Missing Authorization vulnerability in Strategy11 Formidable Forms Missing Authorization vulnerability in Strategy11 Form Builder Team Formidable Forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Formidable Forms: from n/a through 5.5.4. | 9.8 |
2024-12-13 | CVE-2023-40003 | Wedevs | Missing Authorization vulnerability in Wedevs WP Project Manager Missing Authorization vulnerability in weDevs WP Project Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Project Manager: from n/a through 2.6.7. | 9.8 |
2024-12-13 | CVE-2023-40005 | Awesomemotive | Missing Authorization vulnerability in Awesomemotive Easy Digital Downloads Missing Authorization vulnerability in Easy Digital Downloads Easy Digital Downloads allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Digital Downloads: from n/a through 3.1.5. | 9.8 |
2024-12-13 | CVE-2024-28980 | Dell | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Recoverpoint for Virtual Machines 6.0 Dell RecoverPoint for VMs, version(s) 6.0.x contain(s) a Use of a Broken or Risky Cryptographic Algorithm vulnerability in the SSH. | 9.8 |
2024-12-13 | CVE-2024-38488 | Dell | Improper Restriction of Excessive Authentication Attempts vulnerability in Dell Recoverpoint for Virtual Machines 6.0 Dell RecoverPoint for Virtual Machines 6.0.x contains a vulnerability. | 9.8 |
2024-12-13 | CVE-2024-48007 | Dell | Use of Hard-coded Credentials vulnerability in Dell Recoverpoint for Virtual Machines 6.0 Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. | 9.8 |
2024-12-13 | CVE-2024-9290 | The Super Backup & Clone - Migrate for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and a missing capability check on the ibk_restore_migrate_check() function in all versions up to, and including, 2.3.3. | 9.8 | |
2024-12-12 | CVE-2024-49147 | Microsoft | Deserialization of Untrusted Data vulnerability in Microsoft Update Catalog Deserialization of untrusted data in Microsoft Update Catalog allows an unauthorized attacker to elevate privileges on the website’s webserver. | 9.8 |
2024-12-12 | CVE-2024-55663 | Xwiki | Unspecified vulnerability in Xwiki XWiki Platform is a generic wiki platform. | 9.8 |
2024-12-12 | CVE-2024-10124 | The Vayu Blocks – Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation due to a missing capability check on the tp_install() function in all versions up to, and including, 1.1.1. | 9.8 | |
2024-12-12 | CVE-2024-11015 | The Sign In With Google plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.8.0. | 9.8 | |
2024-12-12 | CVE-2024-12497 | 1000Projects | SQL Injection vulnerability in 1000Projects Attendance Tracking Management System 1.0 A vulnerability classified as critical has been found in 1000 Projects Attendance Tracking Management System 1.0. | 9.8 |
2024-12-12 | CVE-2024-44241 | Apple | Unspecified vulnerability in Apple Ipados The issue was addressed with improved bounds checks. | 9.8 |
2024-12-12 | CVE-2024-44242 | Apple | Unspecified vulnerability in Apple Ipados The issue was addressed with improved bounds checks. | 9.8 |
2024-12-12 | CVE-2024-44299 | Apple | Unspecified vulnerability in Apple Ipados The issue was addressed with improved bounds checks. | 9.8 |
2024-12-12 | CVE-2024-54465 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved state management. | 9.8 |
2024-12-12 | CVE-2024-54506 | Apple | Out-of-bounds Read vulnerability in Apple Macos An out-of-bounds access issue was addressed with improved bounds checking. | 9.8 |
2024-12-12 | CVE-2024-54534 | Apple | Out-of-bounds Write vulnerability in Apple products The issue was addressed with improved memory handling. | 9.8 |
2024-12-12 | CVE-2024-47537 | Gstreamer Project | Integer Overflow or Wraparound vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.8 |
2024-12-12 | CVE-2024-47538 | Gstreamer Project | Out-of-bounds Write vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.8 |
2024-12-12 | CVE-2024-47539 | Gstreamer Project | Out-of-bounds Write vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.8 |
2024-12-12 | CVE-2024-47540 | Gstreamer Project | Use of Uninitialized Resource vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.8 |
2024-12-12 | CVE-2024-47606 | Gstreamer Project Debian | Integer Underflow (Wrap or Wraparound) vulnerability in multiple products GStreamer is a library for constructing graphs of media-handling components. | 9.8 |
2024-12-12 | CVE-2024-47607 | Gstreamer Project | Out-of-bounds Write vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.8 |
2024-12-12 | CVE-2024-47613 | Gstreamer Project | Out-of-bounds Write vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.8 |
2024-12-12 | CVE-2024-47615 | Gstreamer Project | Out-of-bounds Write vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.8 |
2024-12-12 | CVE-2024-11948 | GFI | Unspecified vulnerability in GFI Archiver GFI Archiver Telerik Web UI Remote Code Execution Vulnerability. | 9.8 |
2024-12-12 | CVE-2024-12484 | Codezips | Injection vulnerability in Codezips Technical Discussion Forum 1.0 A vulnerability classified as critical was found in Codezips Technical Discussion Forum 1.0. | 9.8 |
2024-12-10 | CVE-2024-11639 | Ivanti | Missing Authentication for Critical Function vulnerability in Ivanti Cloud Services Appliance 4.5/4.6/5.0 An authentication bypass in the admin web console of Ivanti CSA before 5.0.3 allows a remote unauthenticated attacker to gain administrative access | 9.8 |
2024-12-10 | CVE-2024-47484 | Dell | Unspecified vulnerability in Dell Avamar Server Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. | 9.8 |
2024-12-09 | CVE-2024-54920 | Lopalopa | SQL Injection vulnerability in Lopalopa E-Learning Management System 1.0 A SQL Injection vulnerability was found in /teacher_signup.php of kashipara E-learning Management System v1.0, which allows remote attackers to execute arbitrary SQL command to get unauthorized database access via the firstname, lastname, and class_id parameters. | 9.8 |
2024-12-09 | CVE-2024-52480 | Astoundify | Unspecified vulnerability in Astoundify Jobify Missing Authorization vulnerability in Astoundify Jobify - Job Board WordPress Theme.This issue affects Jobify - Job Board WordPress Theme: from n/a through 4.2.3. | 9.8 |
2024-12-09 | CVE-2024-8259 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eryaz Information Technologies NatraCar B2B Dealer Management Program allows SQL Injection.This issue affects NatraCar B2B Dealer Management Program: through 09.12.2024. NOTE: The vendor was contacted and it was learned that the product is not supported. | 9.8 | |
2024-12-09 | CVE-2024-12352 | Totolink | Out-of-bounds Write vulnerability in Totolink Ex1800T Firmware 9.1.0Cu.2112B20220316 A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. | 9.8 |
2024-12-10 | CVE-2024-54032 | Adobe | Unspecified vulnerability in Adobe Connect Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. | 9.3 |
2024-12-10 | CVE-2024-54034 | Adobe | Unspecified vulnerability in Adobe Connect Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. | 9.3 |
2024-12-10 | CVE-2024-54036 | Adobe | Unspecified vulnerability in Adobe Connect Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. | 9.3 |
2024-12-12 | CVE-2024-47597 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.1 |
2024-12-12 | CVE-2024-47598 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.1 |
2024-12-12 | CVE-2024-47600 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.1 |
2024-12-12 | CVE-2024-47774 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.1 |
2024-12-12 | CVE-2024-47775 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.1 |
2024-12-12 | CVE-2024-47776 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.1 |
2024-12-12 | CVE-2024-47777 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.1 |
2024-12-12 | CVE-2024-47834 | Gstreamer Project | Use After Free vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 9.1 |
171 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-12-13 | CVE-2024-22461 | Dell | OS Command Injection vulnerability in Dell Recoverpoint for Virtual Machines 6.0 Dell RecoverPoint for Virtual Machines 6.0.x contains an OS Command injection vulnerability. | 8.8 |
2024-12-12 | CVE-2024-12040 | The Product Carousel Slider & Grid Ultimate for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9.10 via the 'theme' attribute of the `wcpcsu` shortcode. | 8.8 | |
2024-12-12 | CVE-2024-10590 | The Opt-In Downloads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the admin_upload() function in all versions up to, and including, 4.07. | 8.8 | |
2024-12-12 | CVE-2024-11443 | The de:branding plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the debranding_save() function in all versions up to, and including, 1.0.2. | 8.8 | |
2024-12-12 | CVE-2024-11689 | The HQ Rental Software plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.29. | 8.8 | |
2024-12-12 | CVE-2024-12492 | Anisha | SQL Injection vulnerability in Anisha Farmacia 1.0 A vulnerability was found in code-projects Farmacia 1.0. | 8.8 |
2024-12-12 | CVE-2024-54498 | Apple | Unspecified vulnerability in Apple Macos A path handling issue was addressed with improved validation. | 8.8 |
2024-12-12 | CVE-2024-54505 | Apple | Type Confusion vulnerability in Apple products A type confusion issue was addressed with improved memory handling. | 8.8 |
2024-12-12 | CVE-2024-11947 | GFI | Deserialization of Untrusted Data vulnerability in GFI Archiver GFI Archiver Core Service Deserialization of Untrusted Data Remote Code Execution Vulnerability. | 8.8 |
2024-12-12 | CVE-2024-11949 | GFI | Deserialization of Untrusted Data vulnerability in GFI Archiver GFI Archiver Store Service Deserialization of Untrusted Data Remote Code Execution Vulnerability. | 8.8 |
2024-12-12 | CVE-2024-12381 | Type Confusion vulnerability in Google Chrome Type Confusion in V8 in Google Chrome prior to 131.0.6778.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 | |
2024-12-12 | CVE-2024-12382 | Use After Free vulnerability in Google Chrome Use after free in Translate in Google Chrome prior to 131.0.6778.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 | |
2024-12-12 | CVE-2024-12479 | Cjbi | SQL Injection vulnerability in Cjbi Wetech-Cms 1.0/1.1/1.2 A vulnerability was found in cjbi wetech-cms 1.0/1.1/1.2 and classified as critical. | 8.8 |
2024-12-12 | CVE-2024-12480 | Cjbi | SQL Injection vulnerability in Cjbi Wetech-Cms 1.0/1.1/1.2 A vulnerability was found in cjbi wetech-cms 1.0/1.1/1.2. | 8.8 |
2024-12-12 | CVE-2024-12481 | Cjbi | SQL Injection vulnerability in Cjbi Wetech-Cms 1.0/1.1/1.2 A vulnerability was found in cjbi wetech-cms 1.0/1.1/1.2. | 8.8 |
2024-12-12 | CVE-2024-12485 | Fabian | Injection vulnerability in Fabian Online Class and Exam Scheduling System 1.0 A vulnerability, which was classified as critical, has been found in code-projects Online Class and Exam Scheduling System 1.0. | 8.8 |
2024-12-12 | CVE-2024-12486 | Fabian | Injection vulnerability in Fabian Online Class and Exam Scheduling System 1.0 A vulnerability, which was classified as critical, was found in code-projects Online Class and Exam Scheduling System 1.0. | 8.8 |
2024-12-12 | CVE-2024-12487 | Fabian | Injection vulnerability in Fabian Online Class and Exam Scheduling System 1.0 A vulnerability has been found in code-projects Online Class and Exam Scheduling System 1.0 and classified as critical. | 8.8 |
2024-12-12 | CVE-2024-12488 | Fabian | Unspecified vulnerability in Fabian Online Class and Exam Scheduling System 1.0 A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0 and classified as critical. | 8.8 |
2024-12-12 | CVE-2024-12489 | Fabian | Injection vulnerability in Fabian Online Class and Exam Scheduling System 1.0 A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. | 8.8 |
2024-12-11 | CVE-2024-47760 | Glpi Project | Unspecified vulnerability in Glpi-Project Glpi GLPI is a free asset and IT management software package. | 8.8 |
2024-12-11 | CVE-2024-47758 | Glpi Project | Unspecified vulnerability in Glpi-Project Glpi GLPI is a free asset and IT management software package. | 8.8 |
2024-12-10 | CVE-2024-9844 | Ivanti | Unspecified vulnerability in Ivanti Connect Secure Insufficient server-side controls in Secure Application Manager of Ivanti Connect Secure before version 22.7R2.4 allows a remote authenticated attacker to bypass restrictions. | 8.8 |
2024-12-10 | CVE-2024-47977 | Dell | Unspecified vulnerability in Dell Avamar Server Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. | 8.8 |
2024-12-10 | CVE-2024-52538 | Dell | Unspecified vulnerability in Dell Avamar Server Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. | 8.8 |
2024-12-09 | CVE-2024-45760 | Dell | Missing Authorization vulnerability in Dell Openmanage Server Administrator Dell OpenManage Server Administrator, versions 11.0.1.0 and prior, contains an improper access control vulnerability. | 8.8 |
2024-12-09 | CVE-2024-54926 | Lopalopa | SQL Injection vulnerability in Lopalopa E-Learning Management System 1.0 A SQL Injection vulnerability was found in /search_class.php of kashipara E-learning Management System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the school_year parameter. | 8.8 |
2024-12-09 | CVE-2023-23715 | Ultimatemember | Missing Authorization vulnerability in Ultimatemember Jobboardwp Missing Authorization vulnerability in JobBoardWP JobBoardWP – Job Board Listings and Submissions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JobBoardWP – Job Board Listings and Submissions: from n/a through 1.2.2. | 8.8 |
2024-12-09 | CVE-2023-47760 | Wpdeveloper | Missing Authorization vulnerability in Wpdeveloper Essential Blocks Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 4.2.0. | 8.8 |
2024-12-09 | CVE-2023-47822 | Sonaar | Missing Authorization vulnerability in Sonaar MP3 Audio Player for Music, Radio & Podcast Missing Authorization vulnerability in Sonaar Music MP3 Audio Player for Music, Radio & Podcast by Sonaar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 4.10. | 8.8 |
2024-12-09 | CVE-2023-51359 | Wpdeveloper | Missing Authorization vulnerability in Wpdeveloper Essential Blocks Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 4.2.0. | 8.8 |
2024-12-09 | CVE-2023-51360 | Wpdeveloper | Missing Authorization vulnerability in Wpdeveloper Essential Blocks Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 4.2.0. | 8.8 |
2024-12-09 | CVE-2024-53816 | Themeum | Missing Authorization vulnerability in Themeum Tutor LMS Elementor Addons Missing Authorization vulnerability in Themeum Tutor LMS Elementor Addons.This issue affects Tutor LMS Elementor Addons: from n/a through 2.1.5. | 8.8 |
2024-12-09 | CVE-2024-12358 | Datax WEB Project | OS Command Injection vulnerability in Datax-Web Project Datax-Web 2.1.1 A vulnerability was found in WeiYe-Jing datax-web 2.1.1. | 8.8 |
2024-12-09 | CVE-2024-12360 | Online Class AND Exam Scheduling System Project | SQL Injection vulnerability in Online Class and Exam Scheduling System Project Online Class and Exam Scheduling System 1.0 A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. | 8.8 |
2024-12-09 | CVE-2024-12349 | Jwillber | Cross-Site Request Forgery (CSRF) vulnerability in Jwillber Jfinalcms 1.0 A vulnerability was found in JFinalCMS 1.0. | 8.8 |
2024-12-09 | CVE-2024-12350 | Jwillber | Code Injection vulnerability in Jwillber Jfinalcms 1.0 A vulnerability was found in JFinalCMS 1.0. | 8.8 |
2024-12-09 | CVE-2024-12351 | Jwillber | SQL Injection vulnerability in Jwillber Jfinalcms 1.0 A vulnerability classified as critical has been found in JFinalCMS 1.0. | 8.8 |
2024-12-12 | CVE-2024-54514 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 8.6 |
2024-12-10 | CVE-2024-11205 | The WPForms plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wpforms_is_admin_page' function in versions starting from 1.8.4 up to, and including, 1.9.2.1. | 8.5 | |
2024-12-12 | CVE-2024-49063 | Microsoft | Deserialization of Untrusted Data vulnerability in Microsoft Muzic Microsoft/Muzic Remote Code Execution Vulnerability | 8.4 |
2024-12-11 | CVE-2024-53290 | Dell | Command Injection vulnerability in Dell Thinos 2408 Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. | 8.4 |
2024-12-12 | CVE-2024-49068 | Microsoft | Unspecified vulnerability in Microsoft Sharepoint Server 2016/2019 Microsoft SharePoint Elevation of Privilege Vulnerability | 8.2 |
2024-12-14 | CVE-2024-11721 | The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.24.5. | 8.1 | |
2024-12-13 | CVE-2024-10783 | The MainWP Child – Securely Connects to the MainWP Dashboard to Manage Multiple Sites plugin for WordPress is vulnerable to privilege escalation due to a missing authorization checks on the register_site function in all versions up to, and including, 5.2 when a site is left in an unconfigured state. | 8.1 | |
2024-12-12 | CVE-2024-12312 | The Print Science Designer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.152 via deserialization of untrusted input through the 'designer-saved-projects' cookie. | 8.1 | |
2024-12-12 | CVE-2024-10111 | The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 6.26.3. | 8.1 | |
2024-12-12 | CVE-2024-49057 | Microsoft | Unspecified vulnerability in Microsoft Defender for Endpoint Microsoft Defender for Endpoint on Android Spoofing Vulnerability | 8.1 |
2024-12-11 | CVE-2024-48912 | Glpi Project | Unspecified vulnerability in Glpi-Project Glpi GLPI is a free asset and IT management software package. | 8.1 |
2024-12-10 | CVE-2024-54037 | Adobe | Unspecified vulnerability in Adobe Connect Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. | 8.1 |
2024-12-09 | CVE-2024-45761 | Dell | Unspecified vulnerability in Dell Openmanage Server Administrator Dell OpenManage Server Administrator, versions 11.0.1.0 and prior, contains an improper input validation vulnerability. | 8.1 |
2024-12-14 | CVE-2024-31891 | IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 contains a local privilege escalation vulnerability. | 7.8 | |
2024-12-12 | CVE-2024-44224 | Apple | Incorrect Default Permissions vulnerability in Apple Macos A permissions issue was addressed with additional restrictions. | 7.8 |
2024-12-12 | CVE-2024-44225 | Apple | Unspecified vulnerability in Apple products A logic issue was addressed with improved checks. | 7.8 |
2024-12-12 | CVE-2024-44291 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved file handling. | 7.8 |
2024-12-12 | CVE-2024-54489 | Apple | Unspecified vulnerability in Apple Macos A path handling issue was addressed with improved validation. | 7.8 |
2024-12-12 | CVE-2024-54515 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved restrictions. | 7.8 |
2024-12-12 | CVE-2024-54529 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved checks. | 7.8 |
2024-12-12 | CVE-2024-49069 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
2024-12-12 | CVE-2024-49142 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Access Remote Code Execution Vulnerability | 7.8 |
2024-12-11 | CVE-2024-10251 | Ivanti | Incorrect Default Permissions vulnerability in Ivanti Security Controls Under specific circumstances, insecure permissions in Ivanti Security Controls before version 2024.4.1 allows a local authenticated attacker to achieve local privilege escalation. | 7.8 |
2024-12-11 | CVE-2024-11597 | Ivanti | Incorrect Default Permissions vulnerability in Ivanti Performance Manager 2023.3/2024.1/2024.3 Under specific circumstances, insecure permissions in Ivanti Performance Manager before version 2024.3 HF1, 2024.1 HF1, or 2023.3 HF1 allows a local authenticated attacker to achieve local privilege escalation. | 7.8 |
2024-12-11 | CVE-2024-11598 | Ivanti | Incorrect Default Permissions vulnerability in Ivanti Application Control 2023.3/2024.1/2024.3 Under specific circumstances, insecure permissions in Ivanti Application Control before version 2024.3 HF1, 2024.1 HF2, or 2023.3 HF3 allows a local authenticated attacker to achieve local privilege escalation. | 7.8 |
2024-12-11 | CVE-2024-8496 | Ivanti | Incorrect Default Permissions vulnerability in Ivanti Workspace Control Under specific circumstances, insecure permissions in Ivanti Workspace Control before version 10.18.40.0 allows a local authenticated attacker to achieve local privilege escalation. | 7.8 |
2024-12-11 | CVE-2024-9845 | Ivanti | Incorrect Default Permissions vulnerability in Ivanti Automation Under specific circumstances, insecure permissions in Ivanti Automation before version 2024.4.0.1 allows a local authenticated attacker to achieve local privilege escalation. | 7.8 |
2024-12-10 | CVE-2024-52999 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Modeler Substance3D - Modeler versions 1.14.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53000 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Modeler Substance3D - Modeler versions 1.14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53001 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Modeler Substance3D - Modeler versions 1.14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53002 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Modeler Substance3D - Modeler versions 1.14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53003 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Modeler Substance3D - Modeler versions 1.14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53955 | Adobe | Integer Underflow (Wrap or Wraparound) vulnerability in Adobe Bridge Bridge versions 14.1.3, 15.0 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53956 | Adobe | Out-of-bounds Write vulnerability in Adobe Premiere PRO Premiere Pro versions 25.0, 24.6.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53957 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Painter Substance3D - Painter versions 10.1.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53958 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Painter Substance3D - Painter versions 10.1.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53959 | Adobe | Out-of-bounds Write vulnerability in Adobe Framemaker Adobe Framemaker versions 2020.7, 2022.5 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-45155 | Adobe | Access of Uninitialized Pointer vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-45156 | Adobe | NULL Pointer Dereference vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49537 | Adobe | Out-of-bounds Write vulnerability in Adobe After Effects After Effects versions 24.6.2, 25.0.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49538 | Adobe | Out-of-bounds Write vulnerability in Adobe Illustrator Illustrator versions 29.0.0, 28.7.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49543 | Adobe | Out-of-bounds Write vulnerability in Adobe Indesign InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49544 | Adobe | Out-of-bounds Write vulnerability in Adobe Indesign InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49545 | Adobe | Out-of-bounds Write vulnerability in Adobe Indesign InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52982 | Adobe | Unspecified vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52983 | Adobe | Integer Overflow or Wraparound vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52984 | Adobe | Integer Underflow (Wrap or Wraparound) vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52985 | Adobe | Integer Underflow (Wrap or Wraparound) vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52986 | Adobe | Integer Underflow (Wrap or Wraparound) vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52987 | Adobe | Integer Underflow (Wrap or Wraparound) vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52988 | Adobe | Out-of-bounds Write vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52989 | Adobe | Integer Underflow (Wrap or Wraparound) vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52990 | Adobe | Unspecified vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by a Buffer Underwrite ('Buffer Underflow') vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52994 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Sampler 4.2.1/4.5.1 Substance3D - Sampler versions 4.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52995 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Sampler 4.2.1/4.5.1 Substance3D - Sampler versions 4.5.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52996 | Adobe | Out-of-bounds Write vulnerability in Adobe Substance 3D Sampler 4.2.1/4.5.1 Substance3D - Sampler versions 4.5.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-52997 | Adobe | Use After Free vulnerability in Adobe Photoshop 26.0 Photoshop Desktop versions 26.0 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53953 | Adobe | Use After Free vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-53954 | Adobe | Integer Underflow (Wrap or Wraparound) vulnerability in Adobe Animate Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49530 | Adobe | Unspecified vulnerability in Adobe products Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49551 | Adobe | Out-of-bounds Write vulnerability in Adobe Media Encoder Media Encoder versions 25.0, 24.6.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49552 | Adobe | Out-of-bounds Write vulnerability in Adobe Media Encoder Media Encoder versions 25.0, 24.6.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49553 | Adobe | Out-of-bounds Write vulnerability in Adobe Media Encoder Media Encoder versions 25.0, 24.6.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2024-12-10 | CVE-2024-49849 | A vulnerability has been identified in SIMATIC S7-PLCSIM V16 (All versions), SIMATIC S7-PLCSIM V17 (All versions), SIMATIC STEP 7 Safety V16 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions), SIMATIC WinCC Unified V16 (All versions), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions), SIMATIC WinCC V16 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions), SIMOCODE ES V16 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SIMOTION SCOUT TIA V5.6 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V16 (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions). | 7.8 | |
2024-12-10 | CVE-2024-53041 | A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 | |
2024-12-10 | CVE-2024-53242 | A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). | 7.8 | |
2024-12-10 | CVE-2024-54093 | A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 5). | 7.8 | |
2024-12-10 | CVE-2024-54094 | A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 5). | 7.8 | |
2024-12-10 | CVE-2024-54095 | A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 10). | 7.8 | |
2024-12-09 | CVE-2024-49600 | Dell | Unspecified vulnerability in Dell Power Manager Dell Power Manager (DPM), versions prior to 3.17, contain an improper access control vulnerability. | 7.8 |
2024-12-09 | CVE-2024-12353 | Razormist | Unspecified vulnerability in Razormist Phone Contact Manager System 1.0 A vulnerability, which was classified as problematic, has been found in SourceCodester Phone Contact Manager System 1.0. | 7.8 |
2024-12-09 | CVE-2024-12354 | Razormist | Out-of-bounds Write vulnerability in Razormist Phone Contact Manager System 1.0 A vulnerability, which was classified as critical, was found in SourceCodester Phone Contact Manager System 1.0. | 7.8 |
2024-12-09 | CVE-2024-12355 | Razormist | Unspecified vulnerability in Razormist Phone Contact Manager System 1.0 A vulnerability has been found in SourceCodester Phone Contact Manager System 1.0 and classified as problematic. | 7.8 |
2024-12-10 | CVE-2023-6947 | The Best WordPress Gallery Plugin – FooGallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.26. | 7.7 | |
2024-12-14 | CVE-2024-31892 | IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 could allow a user to perform unauthorized actions after intercepting and modifying a csv file due to improper neutralization of formula elements. | 7.5 | |
2024-12-14 | CVE-2024-11711 | Wpjobportal | SQL Injection vulnerability in Wpjobportal WP JOB Portal The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to SQL Injection via the 'resumeid' parameter in all versions up to, and including, 2.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 7.5 |
2024-12-12 | CVE-2024-54119 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2024-12-12 | CVE-2024-54097 | Huawei | Unspecified vulnerability in Huawei Emui and Harmonyos Security vulnerability in the HiView module Impact: Successful exploitation of this vulnerability may affect feature implementation and integrity. | 7.5 |
2024-12-12 | CVE-2024-54098 | Huawei | Unspecified vulnerability in Huawei Emui and Harmonyos Service logic error vulnerability in the system service module Impact: Successful exploitation of this vulnerability may affect service integrity. | 7.5 |
2024-12-12 | CVE-2024-54100 | Huawei | Unspecified vulnerability in Huawei Emui and Harmonyos Vulnerability of improper access control in the secure input module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. | 7.5 |
2024-12-12 | CVE-2024-54103 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Vulnerability of improper access control in the album module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2024-12-12 | CVE-2024-54104 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2024-12-12 | CVE-2024-54105 | Huawei | Classic Buffer Overflow vulnerability in Huawei Harmonyos 5.0.0 Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-12-12 | CVE-2024-54106 | Huawei | NULL Pointer Dereference vulnerability in Huawei Harmonyos 5.0.0 Null pointer dereference vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-12-12 | CVE-2024-54107 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-12-12 | CVE-2024-54108 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-12-12 | CVE-2024-54109 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-12-12 | CVE-2024-54110 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2024-12-12 | CVE-2024-54111 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-12-12 | CVE-2024-54112 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2024-12-12 | CVE-2024-54113 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Process residence vulnerability in abnormal scenarios in the print module Impact: Successful exploitation of this vulnerability may affect power consumption. | 7.5 |
2024-12-12 | CVE-2024-54114 | Huawei | Out-of-bounds Read vulnerability in Huawei Harmonyos 5.0.0 Out-of-bounds access vulnerability in playback in the DASH module Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-12-12 | CVE-2024-54115 | Huawei | Out-of-bounds Read vulnerability in Huawei Harmonyos 5.0.0 Out-of-bounds read vulnerability in the DASH module Impact: Successful exploitation of this vulnerability will affect availability. | 7.5 |
2024-12-12 | CVE-2024-54116 | Huawei | Out-of-bounds Read vulnerability in Huawei Harmonyos 5.0.0 Out-of-bounds read vulnerability in the M3U8 module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. | 7.5 |
2024-12-12 | CVE-2024-54117 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2024-12-12 | CVE-2024-12172 | The WP Courses LMS – Online Courses Builder, eLearning Courses, Courses Solution, Education Courses plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpc_update_user_meta_option() function in all versions up to, and including, 3.2.21. | 7.5 | |
2024-12-12 | CVE-2024-54479 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 7.5 |
2024-12-12 | CVE-2024-54508 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 7.5 |
2024-12-12 | CVE-2024-47541 | Gstreamer Project | Out-of-bounds Write vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47542 | Gstreamer Project | NULL Pointer Dereference vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47543 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47544 | Gstreamer Project | NULL Pointer Dereference vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47545 | Gstreamer Project | Integer Underflow (Wrap or Wraparound) vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47546 | Gstreamer Project | Integer Underflow (Wrap or Wraparound) vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47596 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47599 | Gstreamer Project | NULL Pointer Dereference vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47601 | Gstreamer Project | NULL Pointer Dereference vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47602 | Gstreamer Project | NULL Pointer Dereference vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47603 | Gstreamer Project | NULL Pointer Dereference vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47778 | Gstreamer Project | Out-of-bounds Read vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-12 | CVE-2024-47835 | Gstreamer Project | NULL Pointer Dereference vulnerability in Gstreamer Project Gstreamer GStreamer is a library for constructing graphs of media-handling components. | 7.5 |
2024-12-09 | CVE-2023-49831 | Metagauss | Missing Authorization vulnerability in Metagauss Registrationmagic Missing Authorization vulnerability in Metagauss User Registration Forms RegistrationMagic allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RegistrationMagic: from n/a through 5.2.3.0. | 7.5 |
2024-12-12 | CVE-2024-49070 | Microsoft | Unspecified vulnerability in Microsoft Sharepoint Server 2016/2019 Microsoft SharePoint Remote Code Execution Vulnerability | 7.4 |
2024-12-12 | CVE-2024-10910 | The The Grid Plus – Unlimited grid layout plugin for WordPress is vulnerable to arbitrary shortcode execution via grid_plus_load_by_category AJAX action in all versions up to, and including, 1.3.5. | 7.3 | |
2024-12-10 | CVE-2024-52051 | A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All versions), SIMATIC S7-PLCSIM V18 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions), SIMATIC WinCC Unified PC Runtime V18 (All versions), SIMATIC WinCC Unified PC Runtime V19 (All versions), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SIMOTION SCOUT TIA V5.6 SP1 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions). | 7.3 | |
2024-12-14 | CVE-2024-11720 | The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via submission forms in all versions up to, and including, 3.24.5 due to insufficient input sanitization and output escaping on the new Taxonomy form. | 7.2 | |
2024-12-14 | CVE-2024-9698 | The Crafthemes Demo Import plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'process_uploaded_files' function in all versions up to, and including, 3.3. | 7.2 | |
2024-12-12 | CVE-2024-11052 | The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the calculations parameter in all versions up to, and including, 3.8.19 due to insufficient input sanitization and output escaping. | 7.2 | |
2024-12-11 | CVE-2024-47761 | Glpi Project | Improper Authentication vulnerability in Glpi-Project Glpi GLPI is a free asset and IT management software package. | 7.2 |
2024-12-10 | CVE-2024-11633 | Ivanti | Argument Injection or Modification vulnerability in Ivanti Connect Secure Argument injection in Ivanti Connect Secure before version 22.7R2.4 allows a remote authenticated attacker with admin privileges to achieve remote code execution | 7.2 |
2024-12-10 | CVE-2024-11634 | Ivanti | Command Injection vulnerability in Ivanti Connect Secure 22.7/7.1/7.4 Command injection in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to achieve remote code execution. | 7.2 |
2024-12-10 | CVE-2024-11772 | Ivanti | Command Injection vulnerability in Ivanti Cloud Services Appliance 4.5/4.6/5.0 Command injection in the admin web console of Ivanti CSA before version 5.0.3 allows a remote authenticated attacker with admin privileges to achieve remote code execution. | 7.2 |
2024-12-10 | CVE-2024-11773 | Ivanti | SQL Injection vulnerability in Ivanti Cloud Services Appliance 4.5/4.6/5.0 SQL injection in the admin web console of Ivanti CSA before version 5.0.3 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements. | 7.2 |
2024-12-09 | CVE-2024-54922 | Lopalopa | SQL Injection vulnerability in Lopalopa E-Learning Management System 1.0 A SQL Injection was found in /admin/edit_user.php of kashipara E-learning Management System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the firstname, lastname, and username parameters. | 7.2 |
2024-12-09 | CVE-2024-54930 | Lopalopa | SQL Injection vulnerability in Lopalopa E-Learning Management System 1.0 Kashipara E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_student.php. | 7.2 |
2024-12-09 | CVE-2024-54933 | Lopalopa | SQL Injection vulnerability in Lopalopa E-Learning Management System 1.0 Kashipara E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_content.php. | 7.2 |
2024-12-09 | CVE-2024-54929 | Lopalopa | SQL Injection vulnerability in Lopalopa E-Learning Management System 1.0 KASHIPARA E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_subject.php. | 7.2 |
2024-12-12 | CVE-2024-54099 | Huawei | Unspecified vulnerability in Huawei Emui and Harmonyos File replacement vulnerability on some devices Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. | 7.1 |
2024-12-12 | CVE-2024-44245 | Apple | Out-of-bounds Write vulnerability in Apple products The issue was addressed with improved memory handling. | 7.1 |
2024-12-12 | CVE-2024-54528 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved restrictions. | 7.1 |
2024-12-11 | CVE-2024-11840 | The RapidLoad – Optimize Web Vitals Automatically plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the uucss_data, update_rapidload_settings, wp_ajax_update_htaccess_file, uucss_update_rule, upload_rules, get_all_rules, update_titan_settings, preload_page, and activate_module functions in all versions up to, and including, 2.4.2. | 7.1 | |
2024-12-12 | CVE-2024-49059 | Microsoft | Race Condition vulnerability in Microsoft products Microsoft Office Elevation of Privilege Vulnerability | 7.0 |
2024-12-11 | CVE-2024-53289 | Dell | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Dell Thinos 2408 Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. | 7.0 |
323 Medium Vulnerabilities
11 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2024-12-13 | CVE-2024-12300 | The AR for WordPress plugin for WordPress is vulnerable to unauthorized double extension file upload due to a missing capability check on the set_ar_featured_image() function in all versions up to, and including, 7.3. | 3.7 | |
2024-12-10 | CVE-2024-43755 | Adobe | Unspecified vulnerability in Adobe Experience Manager Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. | 3.5 |
2024-12-10 | CVE-2024-52831 | Adobe | Unspecified vulnerability in Adobe Experience Manager Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. | 3.5 |
2024-12-12 | CVE-2024-44200 | Apple | Unspecified vulnerability in Apple Ipados This issue was addressed with improved redaction of sensitive information. | 3.3 |
2024-12-12 | CVE-2024-44290 | Apple | Unspecified vulnerability in Apple Ipados This issue was addressed with improved redaction of sensitive information. | 3.3 |
2024-12-12 | CVE-2024-54491 | Apple | Unspecified vulnerability in Apple Macos The issue was resolved by sanitizing logging This issue is fixed in macOS Sequoia 15.2. | 3.3 |
2024-12-12 | CVE-2024-54493 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed through improved state management. | 3.3 |
2024-12-11 | CVE-2023-37395 | IBM | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Aspera Faspex IBM Aspera Faspex 5.0.0 through 5.0.7 could allow a local user to obtain sensitive information due to improper encryption of certain data. | 3.3 |
2024-12-11 | CVE-2023-23472 | IBM InfoSphere DataStage Flow Designer (InfoSphere Information Server 11.7) could allow an authenticated user to obtain sensitive information that could aid in further attacks against the system. | 3.1 | |
2024-12-10 | CVE-2024-55550 | Mitel | Path Traversal vulnerability in Mitel Micollab Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. | 2.7 |
2024-12-12 | CVE-2024-54485 | Apple | Unspecified vulnerability in Apple Iphone OS The issue was addressed by adding additional logic. | 2.4 |