Latest CVE Feed
-
7.1
HIGHCVE-2024-47509
An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
5.4
MEDIUMCVE-2024-39534
An Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast address o... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.7
HIGHCVE-2024-47502
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In specific cases the state of TCP sessions tha... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.9
MEDIUMCVE-2024-47507
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an integrity impact to the downstream d... Read more
- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.4
HIGHCVE-2024-47495
An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. This i... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-39526
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved on PTX... Read more
- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.2
HIGHCVE-2024-47494
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the AgentD process of Juniper Networks Junos OS allows an attacker who is already causing impact to established sessions which generates counter changes picked up by the AgentD process d... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.2
HIGHCVE-2024-8531
CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that could compromise the Data Center Expert software when an upgrade bundle is manipulated to include arbitrary bash scripts that are executed as root.... Read more
Affected Products : data_center_expert- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.1
MEDIUMCVE-2024-9211
The FULL – Cliente plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.22. This makes it possible for una... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.8
HIGHCVE-2024-33580
A DLL hijack vulnerability was reported in Lenovo Personal Cloud that could allow a local attacker to execute code with elevated privileges.... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.8
HIGHCVE-2024-9002
CWE-269: Improper Privilege Management vulnerability exists that could cause unauthorized access, loss of confidentiality, integrity, and availability of the workstation when non-admin authenticated user tries to perform privilege escalation by tampering ... Read more
Affected Products : easergy_studio- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
4.9
MEDIUMCVE-2024-9507
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 2.15.2 due to improper input valida... Read more
Affected Products : contact_form_builder- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.8
HIGHCVE-2024-7847
VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the a... Read more
- Published: Oct. 14, 2024
- Modified: Oct. 15, 2024
-
6.5
MEDIUMCVE-2024-9860
The Bridge Core plugin for WordPress is vulnerable to unauthorized modification of data or loss of data due to a missing capability check on the 'import_action' and 'install_plugin_per_demo' functions in versions up to, and including, 3.3. This makes it p... Read more
Affected Products :- Published: Oct. 12, 2024
- Modified: Oct. 15, 2024
-
5.3
MEDIUMCVE-2024-8760
The Stackable – Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to CSS Injection in all versions up to, and including, 3.13.6. This makes it possible for unauthenticated attackers to embed untrusted style information into comments resulti... Read more
Affected Products : stackable- Published: Oct. 12, 2024
- Modified: Oct. 15, 2024
-
6.3
MEDIUMCVE-2024-9907
A vulnerability classified as problematic was found in QileCMS up to 1.1.3. This vulnerability affects the function sendEmail of the file /qilecms/user/controller/Forget.php of the component Verification Code Handler. The manipulation leads to weak passwo... Read more
Affected Products :- Published: Oct. 13, 2024
- Modified: Oct. 15, 2024
-
6.1
MEDIUMCVE-2024-9670
The 2D Tag Cloud plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 6.0.2. This makes it possible for unauthenticated attackers... Read more
Affected Products :- Published: Oct. 12, 2024
- Modified: Oct. 15, 2024
-
8.5
HIGHCVE-2024-48020
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Revmakx Backup and Staging by WP Time Capsule allows SQL Injection.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.21.... Read more
Affected Products : backup_and_staging_by_wp_time_capsule- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.8
HIGHCVE-2024-44414
A vulnerability was discovered in FBM_292W-21.03.10V, which has been classified as critical. This issue affects the sub_4901E0 function in the msp_info.htm file. Manipulation of the path parameter can lead to command injection.... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.5
HIGHCVE-2024-8070
CWE-312: Cleartext Storage of Sensitive Information vulnerability exists that exposes test credentials in the firmware binary... Read more
Affected Products :- Published: Oct. 13, 2024
- Modified: Oct. 15, 2024