Latest CVE Feed
-
7.5
HIGHCVE-2024-6594
Improper Handling of Exceptional Conditions vulnerability in the WatchGuard Single Sign-On Client on Windows causes the client to crash while handling malformed commands. An attacker with network access to the client could create a denial of service condi... Read more
Affected Products : single_sign-on_client- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
9.1
CRITICALCVE-2024-6593
Incorrect Authorization vulnerability in WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows allows an attacker with network access to execute restricted management commands. This issue affects Authentication Gateway: through 12.10.2.... Read more
Affected Products : authentication_gateway- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
10.0
CRITICALCVE-2024-8888
An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate... Read more
- Published: Sep. 18, 2024
- Modified: Oct. 01, 2024
-
7.8
HIGHCVE-2024-8996
Unquoted Search Path or Element vulnerability in Grafana Agent (Flow mode) on Windows allows Privilege Escalation from Local User to SYSTEM This issue affects Agent Flow: before 0.43.2... Read more
- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
10.0
CRITICALCVE-2024-8887
CIRCUTOR Q-SMT in its firmware version 1.0.4, could be affected by a denial of service (DoS) attack if an attacker with access to the web service bypasses the authentication mechanisms on the login page, allowing the attacker to use all the functionalitie... Read more
- Published: Sep. 18, 2024
- Modified: Oct. 01, 2024
-
10.0
CRITICALCVE-2024-8940
Vulnerability in the Scriptcase application version 9.4.019, which involves the arbitrary upload of a file via /scriptcase/devel/lib/third/jquery_plugin/jQuery-File-Upload/server/php/ via a POST request. An attacker could upload malicious files to the ser... Read more
Affected Products : scriptcase- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
10.0
CRITICALCVE-2024-43693
A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE UTILITY sub-menu can allow a remote attacker to inject arbitrary commands.... Read more
- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
7.8
HIGHCVE-2024-7679
In Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements.... Read more
Affected Products : ui_for_wpf- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
5.5
MEDIUMCVE-2024-46857
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix bridge mode operations when there are no VFs Currently, trying to set the bridge mode attribute when numvfs=0 leads to a crash: bridge link set dev eth2 hwmode vepa [ 1... Read more
Affected Products : linux_kernel- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
5.5
MEDIUMCVE-2024-46867
In the Linux kernel, the following vulnerability has been resolved: drm/xe/client: fix deadlock in show_meminfo() There is a real deadlock as well as sleeping in atomic() bug in here, if the bo put happens to be the last ref, since bo destruction wants ... Read more
Affected Products : linux_kernel- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
5.5
MEDIUMCVE-2024-46866
In the Linux kernel, the following vulnerability has been resolved: drm/xe/client: add missing bo locking in show_meminfo() bo_meminfo() wants to inspect bo state like tt and the ttm resource, however this state can change at any point leading to stuff ... Read more
Affected Products : linux_kernel- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
5.5
MEDIUMCVE-2024-46868
In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: uefisecapp: Fix deadlock in qcuefi_acquire() If the __qcuefi pointer is not set, then in the original code, we would hold onto the lock. That means that if we tried to ... Read more
Affected Products : linux_kernel- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
9.8
CRITICALCVE-2024-43692
An attacker can directly request the ProGauge MAGLINK LX CONSOLE resource sub page with full privileges by requesting the URL directly.... Read more
- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
10.0
CRITICALCVE-2024-45066
A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE IP sub-menu can allow a remote attacker to inject arbitrary commands.... Read more
- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
8.8
HIGHCVE-2024-45373
Once logged in to ProGauge MAGLINK LX4 CONSOLE, a valid user can change their privileges to administrator.... Read more
- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
9.1
CRITICALCVE-2024-6592
Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Windows and MacOS allows Authentication Bypass.This issue a... Read more
- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
5.5
MEDIUMCVE-2024-46856
In the Linux kernel, the following vulnerability has been resolved: net: phy: dp83822: Fix NULL pointer dereference on DP83825 devices The probe() function is only used for DP83822 and DP83826 PHY, leaving the private data pointer uninitialized for the ... Read more
Affected Products : linux_kernel- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
8.8
HIGHCVE-2024-8890
An attacker with access to the network where the CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could obtain legitimate credentials or steal sessions due to the fact that the device only implements the HTTP protocol. This fact prevents a secure ... Read more
- Published: Sep. 18, 2024
- Modified: Oct. 01, 2024
-
9.8
CRITICALCVE-2024-43423
The web application for ProGauge MAGLINK LX4 CONSOLE contains an administrative-level user account with a password that cannot be changed.... Read more
- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
7.8
HIGHCVE-2024-43405
Nuclei is a vulnerability scanner powered by YAML based templates. Starting in version 3.0.0 and prior to version 3.3.2, a vulnerability in Nuclei's template signature verification system could allow an attacker to bypass the signature check and possibly ... Read more
Affected Products : nuclei- Published: Sep. 04, 2024
- Modified: Oct. 01, 2024