Latest CVE Feed
-
4.8
MEDIUMCVE-2024-46980
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact lin... Read more
Affected Products : tuleap- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
4.3
MEDIUMCVE-2024-46528
An Insecure Direct Object Reference (IDOR) vulnerability in KubeSphere 4.x before 4.1.3 and 3.x through 3.4.1 and KubeSphere Enterprise 4.x before 4.1.3 and 3.x through 3.5.0 allows low-privileged authenticated attackers to access sensitive resources with... Read more
Affected Products :- Published: Oct. 14, 2024
- Modified: Aug. 28, 2025
-
7.5
HIGHCVE-2024-48799
An issue in LOREX TECHNOLOGY INC com.lorexcorp.lorexping 1.4.22 allows a remote attacker to obtain sensitive information via the firmware update process.... Read more
Affected Products :- Published: Oct. 14, 2024
- Modified: Mar. 24, 2025
-
7.5
HIGHCVE-2024-48798
An issue in Hubble Connected (com.hubbleconnected.vervelife) 2.00.81 allows a remote attacker to obtain sensitive information via the firmware update process.... Read more
Affected Products :- Published: Oct. 14, 2024
- Modified: Mar. 24, 2025
-
7.5
HIGHCVE-2024-48797
An issue in PCS Engineering Preston Cinema (com.prestoncinema.app) 0.2.0 allows a remote attacker to obtain sensitive information via the firmware update process.... Read more
Affected Products :- Published: Oct. 14, 2024
- Modified: Mar. 25, 2025
-
7.5
HIGHCVE-2024-48796
An issue in EQUES com.eques.plug 1.0.1 allows a remote attacker to obtain sensitive information via the firmware update process.... Read more
Affected Products :- Published: Oct. 14, 2024
- Modified: Mar. 13, 2025
-
9.8
CRITICALCVE-2024-48168
A stack overflow vulnerability exists in the sub_402280 function of the HNAP service of D-Link DCS-960L 1.09, allowing an attacker to execute arbitrary code.... Read more
- Published: Oct. 14, 2024
- Modified: May. 07, 2025
-
9.8
CRITICALCVE-2024-46535
Jepaas v7.2.8 was discovered to contain a SQL injection vulnerability via the orderSQL parameter at /homePortal/loadUserMsg.... Read more
Affected Products : jepaas- Published: Oct. 14, 2024
- Modified: Jul. 03, 2025
-
5.4
MEDIUMCVE-2024-45741
In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a malicious payload through a custom conf... Read more
- Published: Oct. 14, 2024
- Modified: Oct. 17, 2024
-
5.4
MEDIUMCVE-2024-45740
In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through Scheduled Views that could result i... Read more
- Published: Oct. 14, 2024
- Modified: Oct. 17, 2024
-
4.9
MEDIUMCVE-2024-45739
In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at... Read more
Affected Products : splunk- Published: Oct. 14, 2024
- Modified: Oct. 17, 2024
-
4.9
MEDIUMCVE-2024-45738
In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG loggi... Read more
Affected Products : splunk- Published: Oct. 14, 2024
- Modified: Oct. 17, 2024
-
4.3
MEDIUMCVE-2024-45737
In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state of Ap... Read more
- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
6.5
MEDIUMCVE-2024-45736
In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a search query with... Read more
- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
4.3
MEDIUMCVE-2024-45735
In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the "admin" or "power" Splunk roles can see App Key Value ... Read more
- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
4.3
MEDIUMCVE-2024-45734
In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. ... Read more
Affected Products : splunk- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
8.8
HIGHCVE-2024-45733
In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration.... Read more
- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
7.1
HIGHCVE-2024-45732
In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles cou... Read more
- Published: Oct. 14, 2024
- Modified: Oct. 17, 2024
-
8.0
HIGHCVE-2024-45731
In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows Syst... Read more
- Published: Oct. 14, 2024
- Modified: Oct. 17, 2024
-
6.5
MEDIUMCVE-2024-8184
There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors ... Read more
Affected Products : jetty- Published: Oct. 14, 2024
- Modified: Nov. 08, 2024