Latest CVE Feed
-
8.8
HIGHCVE-2024-50456
Missing Authorization vulnerability in The SEO Guys at SEOPress SEOPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SEOPress: from n/a through 8.1.1.... Read more
Affected Products : seopress- Published: Oct. 29, 2024
- Modified: Nov. 07, 2024
-
8.8
HIGHCVE-2024-50455
Missing Authorization vulnerability in The SEO Guys at SEOPress SEOPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SEOPress: from n/a through 8.1.1.... Read more
Affected Products : seopress- Published: Oct. 29, 2024
- Modified: Nov. 07, 2024
-
9.8
CRITICALCVE-2024-9989
The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due a to limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. ... Read more
Affected Products : crypto_tool- Published: Oct. 29, 2024
- Modified: Nov. 07, 2024
-
9.8
CRITICALCVE-2024-9988
The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due to missing validation on the user being supplied in the 'crypto_connect_ajax_process::register' function. This makes it possible for... Read more
Affected Products : crypto_tool- Published: Oct. 29, 2024
- Modified: Nov. 07, 2024
-
7.4
HIGHCVE-2024-6245
Use of Default Credentials vulnerability in Maruti Suzuki SmartPlay on Linux (Infotainment Hub modules) allows attacker to try common or default usernames and passwords.The issue was detected on a 2022 Maruti Suzuki Brezza in India Market. This issue aff... Read more
Affected Products :- Published: Oct. 28, 2024
- Modified: Nov. 07, 2024
-
6.5
MEDIUMCVE-2024-8305
prepareUnique index may cause secondaries to crash due to incorrect enforcement of index constraints on secondaries, where in extreme cases may cause multiple secondaries crashing leading to no primaries. This issue affects MongoDB Server v6.0 versions pr... Read more
Affected Products : mongodb- Published: Oct. 21, 2024
- Modified: Nov. 07, 2024
-
6.1
MEDIUMCVE-2024-10503
A vulnerability was found in Klokan MapTiler tileserver-gl 2.3.1 and classified as problematic. This issue affects some unknown processing of the component URL Handler. The manipulation of the argument key leads to cross site scripting. The attack may be ... Read more
Affected Products : maptiler_tileserver_gl- Published: Oct. 30, 2024
- Modified: Nov. 07, 2024
-
7.7
HIGHCVE-2024-49366
Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, ... Read more
Affected Products : nginx_ui- Published: Oct. 21, 2024
- Modified: Nov. 07, 2024
-
7.5
HIGHCVE-2024-49367
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, the log path of nginxui is controllable. This issue can be combined with the directory traversal at `/api/configs` to read directories and file contents on the serv... Read more
Affected Products : nginx_ui- Published: Oct. 21, 2024
- Modified: Nov. 07, 2024
-
5.5
MEDIUMCVE-2022-48994
In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated against t... Read more
Affected Products : linux_kernel- Published: Oct. 21, 2024
- Modified: Nov. 07, 2024
-
7.8
HIGHCVE-2024-47255
In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrary code execution with root permissions.... Read more
Affected Products : access_commander- Published: Nov. 05, 2024
- Modified: Nov. 07, 2024
-
7.2
HIGHCVE-2024-47254
In 2N Access Commander versions 3.1.1.2 and prior, an Insufficient Verification of Data Authenticity vulnerability could allow an attacker to escalate their privileges and gain root access to the system.... Read more
Affected Products : access_commander- Published: Nov. 05, 2024
- Modified: Nov. 07, 2024
-
7.2
HIGHCVE-2024-47253
In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker with administrative privileges to write files on the filesystem and potentially achieve arbitrary remote code execution. This vulnerability cannot be... Read more
Affected Products : access_commander- Published: Nov. 05, 2024
- Modified: Nov. 07, 2024
-
8.8
HIGHCVE-2024-36485
Zohocorp ManageEngine ADAudit Plus versions below 8121 are vulnerable to SQL Injection in Technician reports option.... Read more
Affected Products : manageengine_adaudit_plus- Published: Nov. 04, 2024
- Modified: Nov. 07, 2024
-
4.3
MEDIUMCVE-2024-44082
In OpenStack Ironic before 26.0.1 and ironic-python-agent before 9.13.1, there is a vulnerability in image processing, in which a crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthori... Read more
Affected Products :- Published: Sep. 06, 2024
- Modified: Nov. 07, 2024
-
5.5
MEDIUMCVE-2024-51517
Vulnerability of improper memory access in the phone service module Impact: Successful exploitation of this vulnerability may affect availability.... Read more
Affected Products : harmonyos- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
7.5
HIGHCVE-2024-51518
Vulnerability of message types not being verified in the advanced messaging modul Impact: Successful exploitation of this vulnerability may affect availability.... Read more
Affected Products : harmonyos- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
5.5
MEDIUMCVE-2024-51519
Vulnerability of input parameters not being verified in the HDC module Impact: Successful exploitation of this vulnerability may affect availability.... Read more
Affected Products : harmonyos- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
8.8
HIGHCVE-2024-50466
Cross-Site Request Forgery (CSRF) vulnerability in DarkMySite DarkMySite – Advanced Dark Mode Plugin for WordPress darkmysite allows Cross Site Request Forgery.This issue affects DarkMySite – Advanced Dark Mode Plugin for WordPress: from n/a through 1.2.8... Read more
Affected Products : darkmysite- Published: Oct. 29, 2024
- Modified: Nov. 06, 2024
-
8.8
HIGHCVE-2024-9990
The Crypto plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.15. This is due to missing nonce validation in the 'crypto_connect_ajax_process::check' function. This makes it possible for unauthenticated at... Read more
Affected Products : crypto_tool- Published: Oct. 29, 2024
- Modified: Nov. 06, 2024