Latest CVE Feed
-
6.0
MEDIUMCVE-2024-47815
IncidentReporting is a MediaWiki extension for moving incident reports from wikitext to database tables. There are a variety of Cross-site Scripting issues, though all of them require elevated permissions. Some are available to anyone who has the `editinc... Read more
Affected Products :- Published: Oct. 09, 2024
- Modified: Oct. 10, 2024
-
6.0
MEDIUMCVE-2024-47812
ImportDump is an extension for mediawiki designed to automate user import requests. Anyone who can edit the interface strings of a wiki (typically administrators and interface admins) can embed XSS payloads in the messages for dates, and thus XSS anyone w... Read more
Affected Products :- Published: Oct. 09, 2024
- Modified: Oct. 10, 2024
-
8.1
HIGHCVE-2024-3656
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or... Read more
- Published: Oct. 09, 2024
- Modified: Dec. 23, 2024
-
2.9
LOWCVE-2024-47813
Wasmtime is an open source runtime for WebAssembly. Under certain concurrent event orderings, a `wasmtime::Engine`'s internal type registry was susceptible to double-unregistration bugs due to a race condition, leading to panics and potentially type regis... Read more
Affected Products : wasmtime- Published: Oct. 09, 2024
- Modified: Oct. 10, 2024
-
5.5
MEDIUMCVE-2024-47763
Wasmtime is an open source runtime for WebAssembly. Wasmtime's implementation of WebAssembly tail calls combined with stack traces can result in a runtime crash in certain WebAssembly modules. The runtime crash may be undefined behavior if Wasmtime was co... Read more
Affected Products : wasmtime- Published: Oct. 09, 2024
- Modified: Oct. 10, 2024
-
7.8
HIGHCVE-2024-9473
A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offe... Read more
- Published: Oct. 09, 2024
- Modified: Nov. 21, 2024
-
5.1
MEDIUMCVE-2024-9471
A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS admin... Read more
- Published: Oct. 09, 2024
- Modified: Oct. 15, 2024
-
5.3
MEDIUMCVE-2024-9470
A vulnerability in Cortex XSOAR allows the disclosure of incident data to users who do not have the privilege to view the data.... Read more
Affected Products : cortex_xsoar- Published: Oct. 09, 2024
- Modified: Oct. 10, 2024
-
5.7
MEDIUMCVE-2024-9469
A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and t... Read more
- Published: Oct. 09, 2024
- Modified: Oct. 15, 2024
-
8.2
HIGHCVE-2024-9468
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this ... Read more
- Published: Oct. 09, 2024
- Modified: Oct. 10, 2024
-
7.0
HIGHCVE-2024-9467
A reflected XSS vulnerability in Palo Alto Networks Expedition enables execution of malicious JavaScript in the context of an authenticated Expedition user's browser if that user clicks on a malicious link, allowing phishing attacks that could lead to Exp... Read more
- Published: Oct. 09, 2024
- Modified: Oct. 15, 2024
-
8.2
HIGHCVE-2024-9466
A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials.... Read more
- Published: Oct. 09, 2024
- Modified: Oct. 17, 2024
-
9.2
CRITICALCVE-2024-9465
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create... Read more
- Actively Exploited
- Published: Oct. 09, 2024
- Modified: Nov. 15, 2024
-
9.3
CRITICALCVE-2024-9464
An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API ke... Read more
- Published: Oct. 09, 2024
- Modified: Oct. 17, 2024
-
9.9
CRITICALCVE-2024-9463
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API ... Read more
- Actively Exploited
- Published: Oct. 09, 2024
- Modified: Nov. 15, 2024
-
7.5
HIGHCVE-2024-46307
A loop hole in the payment logic of Sparkshop v1.16 allows attackers to arbitrarily modify the number of products.... Read more
Affected Products : sparkshop- Published: Oct. 09, 2024
- Modified: Oct. 15, 2024
-
9.8
CRITICALCVE-2024-45746
An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument lis... Read more
Affected Products :- Published: Oct. 09, 2024
- Modified: Oct. 11, 2024
-
7.5
HIGHCVE-2024-43610
Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector... Read more
Affected Products : copilot_studio- Published: Oct. 09, 2024
- Modified: Jan. 10, 2025
-
4.3
MEDIUMCVE-2024-42988
Lack of access control in ChallengeSolves (/api/v1/challenges/<challenge id>/solves) of CTFd v2.0.0 - v3.7.2 allows authenticated users to retrieve a list of users who have solved the challenge, regardless of the Account Visibility settings. The issue is ... Read more
Affected Products :- Published: Oct. 09, 2024
- Modified: Feb. 10, 2025
-
8.0
HIGHCVE-2024-46316
DrayTek Vigor3900 v1.5.1.6 was discovered to contain a command injection vulnerability via the sub_2C920 function at /cgi-bin/mainfunction.cgi. This vulnerability allows attackers to execute arbitrary commands via supplying a crafted HTTP message.... Read more
- Published: Oct. 09, 2024
- Modified: Apr. 10, 2025