Latest CVE Feed
-
7.2
HIGHCVE-2024-8531
CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that could compromise the Data Center Expert software when an upgrade bundle is manipulated to include arbitrary bash scripts that are executed as root.... Read more
Affected Products : data_center_expert- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.8
HIGHCVE-2024-33581
A DLL hijack vulnerability was reported in Lenovo PC Manager AI intelligent scenario that could allow a local attacker to execute code with elevated privileges.... Read more
Affected Products : pcmanager- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.8
HIGHCVE-2024-33580
A DLL hijack vulnerability was reported in Lenovo Personal Cloud that could allow a local attacker to execute code with elevated privileges.... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.4
HIGHCVE-2024-47495
An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. This i... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.7
HIGHCVE-2024-47497
An Uncontrolled Resource Consumption vulnerability in the http daemon (httpd) of Juniper Networks Junos OS on SRX Series, QFX Series, MX Series and EX Series allows an unauthenticated, network-based attacker to cause Denial-of-Service (DoS). An attacker ... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.8
MEDIUMCVE-2024-47496
A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS allows a local, low-privileged attacker to cause a Denial-of-Service (DoS). When a specific command is executed, the pfe crashes. This will cause ... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.1
MEDIUMCVE-2024-9211
The FULL – Cliente plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.22. This makes it possible for una... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.1
MEDIUMCVE-2024-9616
The BlockMeister – Block Pattern Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.10. This makes it possible for ... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.8
HIGHCVE-2024-48813
SQL injection vulnerability in employee-management-system-php-and-mysql-free-download.html taskmatic 1.0 allows a remote attacker to execute arbitrary code via the admin_id parameter of the /update-employee.php component.... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
4.3
MEDIUMCVE-2024-9538
The ShopLentor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.8 via the 'render' function in includes/addons/wl_faq.php. This makes it possible for authenticated attackers, with Contributor-l... Read more
Affected Products : woolentor_-_woocommerce_elementor_addons_\+_builder- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.7
MEDIUMCVE-2023-42133
PAX Android based POS devices allow for escalation of privilege via improperly configured scripts. An attacker must have shell access with system account privileges in order to exploit this vulnerability. A patch addressing this issue was included in fir... Read more
Affected Products : paydroid- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
4.9
MEDIUMCVE-2024-9507
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 2.15.2 due to improper input valida... Read more
Affected Products : contact_form_builder- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.8
MEDIUMCVE-2024-39527
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of pro... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.7
HIGHCVE-2024-47502
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In specific cases the state of TCP sessions tha... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-47503
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX4600 and SRX5000 Series allows an unauthenticated and logically adjacent attacker to cause a Denial-of-Service (... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.2
HIGHCVE-2024-47506
A Deadlock vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a large amount of traffic is processed by ATP Cloud inspe... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-47509
An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-39526
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved on PTX... Read more
- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.8
HIGHCVE-2024-45316
The Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to delete arbitrary folders and files, potentially leadin... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-47498
An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). Several configuration statements meant to enfor... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024