Latest CVE Feed
-
6.8
MEDIUMCVE-2024-39527
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of pro... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
5.4
MEDIUMCVE-2024-39534
An Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast address o... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.3
HIGHCVE-2024-39563
A Command Injection vulnerability in Juniper Networks Junos Space allows an unauthenticated, network-based attacker sending a specially crafted request to execute arbitrary shell commands on the Junos Space Appliance, leading to remote command execution b... Read more
Affected Products : junos_space- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
5.1
MEDIUMCVE-2024-39544
An Incorrect Default Permissions vulnerability in the command line interface (CLI) of Juniper Networks Junos OS Evolved allows a low privileged local attacker to view NETCONF traceoptions files, representing an exposure of sensitive information. On all... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
9.2
CRITICALCVE-2023-25581
pac4j is a security framework for Java. `pac4j-core` prior to version 4.0.0 is affected by a Java deserialization vulnerability. The vulnerability affects systems that store externally controlled values in attributes of the `UserProfile` class from pac4j-... Read more
Affected Products : pac4j- Published: Oct. 10, 2024
- Modified: Oct. 15, 2024
-
8.2
HIGHCVE-2024-47494
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the AgentD process of Juniper Networks Junos OS allows an attacker who is already causing impact to established sessions which generates counter changes picked up by the AgentD process d... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.5
MEDIUMCVE-2024-7514
The WordPress Comments Import & Export plugin for WordPress is vulnerable to to arbitrary file read due to insufficient file path validation during the comments import process, in versions up to, and including, 2.3.7. This makes it possible for authentica... Read more
Affected Products : wordpress_comments_import_and_export- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.1
MEDIUMCVE-2024-9232
The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.9.1. This makes it p... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
9.8
CRITICALCVE-2024-9234
The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-act... Read more
Affected Products : gutenkit- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
5.9
MEDIUMCVE-2024-8530
CWE-306: Missing Authentication for Critical Function vulnerability exists that could cause exposure of private data when an already generated “logcaptures” archive is accessed directly by HTTPS.... Read more
Affected Products : data_center_expert- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.7
MEDIUMCVE-2023-42133
PAX Android based POS devices allow for escalation of privilege via improperly configured scripts. An attacker must have shell access with system account privileges in order to exploit this vulnerability. A patch addressing this issue was included in fir... Read more
Affected Products : paydroid- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
10.0
CRITICALCVE-2024-47875
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3.... Read more
Affected Products : dompurify- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-47505
An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.8
HIGHCVE-2024-9002
CWE-269: Improper Privilege Management vulnerability exists that could cause unauthorized access, loss of confidentiality, integrity, and availability of the workstation when non-admin authenticated user tries to perform privilege escalation by tampering ... Read more
Affected Products : easergy_studio- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
4.3
MEDIUMCVE-2024-9538
The ShopLentor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.8 via the 'render' function in includes/addons/wl_faq.php. This makes it possible for authenticated attackers, with Contributor-l... Read more
Affected Products : woolentor_-_woocommerce_elementor_addons_\+_builder- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
4.9
MEDIUMCVE-2024-9507
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 2.15.2 due to improper input valida... Read more
Affected Products : contact_form_builder- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.1
MEDIUMCVE-2024-9346
The Embed videos and respect privacy plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'v' parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible fo... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.1
MEDIUMCVE-2024-9610
The Language Switcher plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.7.13. This makes it possible for unauthenticated att... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.8
HIGHCVE-2024-48827
An issue in sbondCo Watcharr v.1.43.0 allows a remote attacker to execute arbitrary code and escalate privileges via the Change Password function.... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.4
HIGHCVE-2024-47495
An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. This i... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024