Latest CVE Feed
-
5.7
MEDIUMCVE-2024-11165
An information disclosure vulnerability exists in the backup configuration process where the SAS token is not masked in the configuration response. This oversight results in sensitive information leakage within the yb_backup log files, exposing the SAS to... Read more
Affected Products : yugabytedb- Published: Nov. 13, 2024
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2024-48989
A vulnerability in the PROFINET stack implementation of the IndraDrive (all versions) of Bosch Rexroth allows an attacker to cause a denial of service, rendering the device unresponsive by sending arbitrary UDP messages.... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 13, 2024
-
5.3
MEDIUMCVE-2024-11159
Using remote content in OpenPGP encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird < 128.4.3 and Thunderbird < 132.0.1.... Read more
Affected Products : thunderbird- Published: Nov. 13, 2024
- Modified: Dec. 06, 2024
-
9.1
CRITICALCVE-2022-45157
A vulnerability has been identified in the way that Rancher stores vSphere's CPI (Cloud Provider Interface) and CSI (Container Storage Interface) credentials used to deploy clusters through the vSphere cloud provider. This issue leads to the vSphere CPI a... Read more
Affected Products : rancher- Published: Nov. 13, 2024
- Modified: Nov. 13, 2024
-
7.8
HIGHCVE-2024-47574
A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with hig... Read more
Affected Products : forticlient- Published: Nov. 13, 2024
- Modified: Jan. 21, 2025
-
7.5
HIGHCVE-2024-4741
Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 13, 2024
-
6.9
MEDIUMCVE-2024-8001
A vulnerability was found in VIWIS LMS 9.11. It has been classified as critical. Affected is an unknown function of the component Print Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. A user with the... Read more
Affected Products : learning_management_system- Published: Nov. 13, 2024
- Modified: Jan. 08, 2025
-
9.8
CRITICALCVE-2024-11028
The MultiManager WP – Manage All Your WordPress Sites Easily plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the user impersonation feature inappropriately determining the current use... Read more
Affected Products : multimanager_wp- Published: Nov. 13, 2024
- Modified: Nov. 19, 2024
-
6.4
MEDIUMCVE-2024-9682
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Form Builder widget in all versions up to, and including, 1.7.1001 due to insufficient input sanitization and output escaping on us... Read more
Affected Products : royal_elementor_addons- Published: Nov. 13, 2024
- Modified: Nov. 19, 2024
-
6.4
MEDIUMCVE-2024-9668
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 1.7.1001 due to insufficient input sanitization and output escaping on user ... Read more
Affected Products : royal_elementor_addons- Published: Nov. 13, 2024
- Modified: Nov. 19, 2024
-
6.4
MEDIUMCVE-2024-9059
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Google Maps widget in all versions up to, and including, 1.7.1001 due to insufficient input sanitization and output escaping. This makes it ... Read more
Affected Products : royal_elementor_addons- Published: Nov. 13, 2024
- Modified: Nov. 19, 2024
-
6.1
MEDIUMCVE-2024-10877
The AFI – The Easiest Integration Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.92.0. This mak... Read more
Affected Products : advanced_form_integration- Published: Nov. 13, 2024
- Modified: Nov. 19, 2024
-
4.8
MEDIUMCVE-2024-52268
Cross-site scripting vulnerability exists in VK All in One Expansion Unit versions prior to 9.100.1.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing the web site using the product.... Read more
Affected Products : vk_all_in_one_expansion_unit- Published: Nov. 13, 2024
- Modified: Nov. 19, 2024
-
8.7
HIGHCVE-2024-9409
CWE-400: An Uncontrolled Resource Consumption vulnerability exists that could cause the device to become unresponsive resulting in communication loss when a large amount of IGMP packets is present in the network.... Read more
- Published: Nov. 13, 2024
- Modified: Nov. 19, 2024
-
9.2
CRITICALCVE-2024-8938
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could cause a potential arbitrary code execution after a successful Man-In-The-Middle attack followed by sending a crafted Modbus function call to t... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 13, 2024
-
8.3
HIGHCVE-2024-8937
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could cause a potential arbitrary code execution after a successful Man-In-The Middle attack followed by sending a crafted Modbus function call to t... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 13, 2024
-
8.3
HIGHCVE-2024-8936
CWE-20: Improper Input Validation vulnerability exists that could lead to loss of confidentiality of controller memory after a successful Man-In-The-Middle attack followed by sending a crafted Modbus function call used to tamper with memory.... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 13, 2024
-
7.7
HIGHCVE-2024-8935
CWE-290: Authentication Bypass by Spoofing vulnerability exists that could cause a denial of service and loss of confidentiality and integrity of controllers when conducting a Man-In-The-Middle attack between the controller and the engineering workstation... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 13, 2024
-
9.8
CRITICALCVE-2024-21541
Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the ... Read more
Affected Products : dom-iterator- Published: Nov. 13, 2024
- Modified: Jan. 14, 2025
-
9.8
CRITICALCVE-2024-11150
The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 16.6. This makes it possible for unauth... Read more
Affected Products : user_extra_fields- Published: Nov. 13, 2024
- Modified: Nov. 19, 2024