Latest CVE Feed
-
7.8
HIGHCVE-2024-34678
Out-of-bounds write in libsapeextractor.so prior to SMR Nov-2024 Release 1 allows local attackers to cause memory corruption.... Read more
- Published: Nov. 06, 2024
- Modified: Nov. 12, 2024
-
4.0
MEDIUMCVE-2024-34677
Exposure of sensitive information in System UI prior to SMR Nov-2024 Release 1 allow local attackers to make malicious apps appear as legitimate.... Read more
- Published: Nov. 06, 2024
- Modified: Nov. 12, 2024
-
7.3
HIGHCVE-2024-34676
Out-of-bounds write in parsing subtitle file in libsubextractor.so prior to SMR Nov-2024 Release 1 allows local attackers to cause memory corruption. User interaction is required for triggering this vulnerability.... Read more
- Published: Nov. 06, 2024
- Modified: Nov. 12, 2024
-
4.6
MEDIUMCVE-2024-34675
Improper access control in Dex Mode prior to SMR Nov-2024 Release 1 allows physical attackers to temporarily access to unlocked screen.... Read more
- Published: Nov. 06, 2024
- Modified: Nov. 12, 2024
-
4.6
MEDIUMCVE-2024-34674
Improper access control in Contacts prior to SMR Nov-2024 Release 1 allows physical attackers to access data across multiple user profiles.... Read more
- Published: Nov. 06, 2024
- Modified: Nov. 12, 2024
-
5.5
MEDIUMCVE-2024-34673
Improper Input Validation in IpcProtocol in Modem prior to SMR Nov-2024 Release 1 allows local attackers to cause Denial-of-Service.... Read more
- Published: Nov. 06, 2024
- Modified: Nov. 13, 2024
-
6.1
MEDIUMCVE-2024-10647
The WS Form LITE – Drag & Drop Contact Form Builder for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.9.244... Read more
Affected Products : ws_form- Published: Nov. 06, 2024
- Modified: Nov. 08, 2024
-
7.5
HIGHCVE-2024-10028
The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.13 via the exposed process stats file during the backup process... Read more
Affected Products : everest_backup- Published: Nov. 06, 2024
- Modified: Nov. 08, 2024
-
9.8
CRITICALCVE-2024-51358
An issue in Linux Server Heimdall v.2.6.1 allows a remote attacker to execute arbitrary code via a crafted script to the Add new application.... Read more
Affected Products :- Published: Nov. 05, 2024
- Modified: Nov. 07, 2024
-
9.8
CRITICALCVE-2024-51115
DCME-320 v7.4.12.90 was discovered to contain a command injection vulnerability.... Read more
Affected Products :- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
9.8
CRITICALCVE-2024-48746
An issue in Lens Visual integration with Power BI v.4.0.0.3 allows a remote attacker to execute arbitrary code via the Natural language processing component... Read more
Affected Products :- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
9.8
CRITICALCVE-2024-48176
Lylme Spage v1.9.5 is vulnerable to Incorrect Access Control. There is no limit on the number of login attempts, and the verification code will not be refreshed after a failed login, which allows attackers to blast the username and password and log into t... Read more
Affected Products : lylme_spage- Published: Nov. 05, 2024
- Modified: May. 01, 2025
-
6.8
MEDIUMCVE-2024-47464
An authenticated Path Traversal vulnerability exists in Instant AOS-8 and AOS-10. Successful exploitation of this vulnerability allows an attacker to copy arbitrary files to a user readable location from the command line interface of the underlying operat... Read more
Affected Products :- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
7.2
HIGHCVE-2024-47463
An arbitrary file creation vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. Successful exploitation of this vulnerability could allow an authenticated remote attacker to create arbitrary files, which could lead to a remote comm... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
7.2
HIGHCVE-2024-47462
An arbitrary file creation vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. Successful exploitation of this vulnerability could allow an authenticated remote attacker to create arbitrary files, which could lead to a remote comm... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
7.2
HIGHCVE-2024-47461
An authenticated command injection vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. A successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying ope... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
9.0
CRITICALCVE-2024-47460
Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
9.8
CRITICALCVE-2024-42509
Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
2.3
LOWCVE-2024-51756
The cap-std project is organized around the eponymous `cap-std` crate, and develops libraries to make it easy to write capability-based code. cap-std's filesystem sandbox implementation on Windows blocks access to special device filenames such as "COM1", ... Read more
Affected Products :- Published: Nov. 05, 2024
- Modified: Nov. 21, 2024
-
10.0
CRITICALCVE-2024-51745
Wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's filesystem sandbox implementation on Windows blocks access to special device filenames such as "COM1", "COM2", "LPT0", "LPT1", and so on, however it did not block access to the special devi... Read more
Affected Products : wasmtime- Published: Nov. 05, 2024
- Modified: Sep. 04, 2025