Latest CVE Feed
-
8.7
HIGHCVE-2024-9472
A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specif... Read more
Affected Products : pan-os- Published: Nov. 14, 2024
- Modified: Nov. 15, 2024
-
9.3
CRITICALCVE-2024-48973
The debug port on the ventilator's serial interface is enabled by default. This could allow an attacker to send and receive messages over the debug port (which are unencrypted; see 3.2.1) that result in unauthorized disclosure of information and/or have u... Read more
Affected Products :- Published: Nov. 14, 2024
- Modified: Nov. 15, 2024
-
7.1
HIGHCVE-2024-51687
Cross-Site Request Forgery (CSRF) vulnerability in Platform.Ly Platform.Ly Official allows Stored XSS.This issue affects Platform.Ly Official: from n/a through 1.1.3.... Read more
Affected Products :- Published: Nov. 14, 2024
- Modified: Nov. 15, 2024
-
9.9
CRITICALCVE-2024-9463
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API ... Read more
- Actively Exploited
- Published: Oct. 09, 2024
- Modified: Nov. 15, 2024
-
8.8
HIGHCVE-2024-51377
An issue in Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 allows a remote attacker to execute arbitrary code via the Subject and Identifier fields... Read more
Affected Products : faveo_helpdesk- Published: Nov. 01, 2024
- Modified: Nov. 14, 2024
-
7.7
HIGHCVE-2024-49381
Plenti, a static site generator, has an arbitrary file deletion vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write deletion when a plenti user serves their website. This issue may lead to informati... Read more
Affected Products : plenti- Published: Oct. 25, 2024
- Modified: Nov. 14, 2024
-
8.8
HIGHCVE-2024-49376
Autolab, a course management service that enables auto-graded programming assignments, has misconfigured reset password permissions in version 3.0.0. For email-based accounts, users with insufficient privileges could reset and theoretically access privile... Read more
Affected Products : autolab- Published: Oct. 25, 2024
- Modified: Nov. 14, 2024
-
9.8
CRITICALCVE-2024-11016
Webopac from Grand Vice info has a SQL Injection vulnerability, allowing unauthenticated remote attacks to inject arbitrary SQL commands to read, modify, and delete database contents.... Read more
Affected Products : webopac- Published: Nov. 11, 2024
- Modified: Nov. 14, 2024
-
9.8
CRITICALCVE-2024-10381
This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request ... Read more
- Published: Oct. 25, 2024
- Modified: Nov. 14, 2024
-
5.9
MEDIUMCVE-2024-41738
IBM TXSeries for Multiplatforms 10.1 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques.... Read more
Affected Products : txseries_for_multiplatforms- Published: Nov. 01, 2024
- Modified: Nov. 14, 2024
-
8.8
HIGHCVE-2024-25431
An issue in bytecodealliance wasm-micro-runtime before v.b3f728c and fixed in commit 06df58f allows a remote attacker to escalate privileges via a crafted file to the check_was_abi_compatibility function.... Read more
Affected Products : webassembly_micro_runtime- Published: Nov. 08, 2024
- Modified: Nov. 14, 2024
-
5.3
MEDIUMCVE-2024-41741
IBM TXSeries for Multiplatforms 10.1 could allow an attacker to determine valid usernames due to an observable timing discrepancy which could be used in further attacks against the system.... Read more
Affected Products : txseries_for_multiplatforms- Published: Nov. 01, 2024
- Modified: Nov. 14, 2024
-
8.8
HIGHCVE-2024-50634
A vulnerability in a weak JWT token in Watcharr v1.43.0 and below allows attackers to perform privilege escalation using a crafted JWT token. This vulnerability is not limited to privilege escalation but also affects all functions that require authenticat... Read more
Affected Products : watcharr- Published: Nov. 08, 2024
- Modified: Nov. 14, 2024
-
7.8
HIGHCVE-2024-46956
An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution.... Read more
- Published: Nov. 10, 2024
- Modified: Nov. 14, 2024
-
7.5
HIGHCVE-2024-40592
An improper verification of cryptographic signature vulnerability [CWE-347] in FortiClient MacOS version 7.4.0, version 7.2.4 and below, version 7.0.10 and below, version 6.4.10 and below may allow a local authenticated attacker to swap the installer with... Read more
Affected Products : forticlient- Published: Nov. 12, 2024
- Modified: Nov. 14, 2024
-
6.1
MEDIUMCVE-2024-41745
IBM CICS TX Standard is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure withi... Read more
Affected Products : cics_tx- Published: Nov. 01, 2024
- Modified: Nov. 14, 2024
-
5.9
MEDIUMCVE-2024-46635
An issue in the API endpoint /AccountMaster/GetCurrentUserInfo of INROAD before v202402060 allows attackers to access sensitive information via a crafted payload to the UserNameOrPhoneNumber parameter.... Read more
Affected Products :- Published: Sep. 30, 2024
- Modified: Nov. 14, 2024
-
8.8
HIGHCVE-2024-36513
A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts.... Read more
Affected Products : forticlient- Published: Nov. 12, 2024
- Modified: Nov. 14, 2024
-
4.4
MEDIUMCVE-2024-36509
An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiWeb version 7.6.0, version 7.4.3 and below, version 7.2.10 and below, version 7.0.10 and below, version 6.3.23 and below may allow an authenticat... Read more
Affected Products : fortiweb- Published: Nov. 12, 2024
- Modified: Nov. 14, 2024
-
7.8
HIGHCVE-2024-36507
A untrusted search path in Fortinet FortiClientWindows versions 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering.... Read more
Affected Products : forticlient- Published: Nov. 12, 2024
- Modified: Nov. 14, 2024