Latest CVE Feed
-
10.0
CRITICALCVE-2024-43918
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WBW WBW Product Table PRO allows SQL Injection.This issue affects WBW Product Table PRO: from n/a through 1.9.4.... Read more
Affected Products : product_table- Published: Aug. 29, 2024
- Modified: Oct. 10, 2024
-
4.0
MEDIUMCVE-2024-34670
Use of implicit intent for sensitive communication in Sound Assistant prior to version 6.1.0.9 allows local attackers to get sensitive information.... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
5.1
MEDIUMCVE-2024-47973
In some Solidigm DC Products, a defect in device overprovisioning may provide information disclosure to an attacker.... Read more
Affected Products :- Published: Oct. 07, 2024
- Modified: Oct. 10, 2024
-
6.5
MEDIUMCVE-2024-47818
Saltcorn is an extensible, open source, no-code database application builder. A logged-in user with any role can delete arbitrary files on the filesystem by calling the `sync/clean_sync_dir` endpoint. The `dir_name` POST parameter is not validated/sanitiz... Read more
Affected Products :- Published: Oct. 07, 2024
- Modified: Oct. 10, 2024
-
7.3
HIGHCVE-2024-21532
All versions of the package ggit are vulnerable to Command Injection via the fetchTags(branch) API, which allows user input to specify the branch to be fetched and then concatenates this string along with a git command which is then passed to the unsafe e... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
6.4
MEDIUMCVE-2024-9292
The Bridge Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'formforall' shortcode in versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it poss... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
6.1
MEDIUMCVE-2024-47817
Lara-zeus Dynamic Dashboard simple way to manage widgets for your website landing page, and filament dashboard and Lara-zeus artemis is a collection of themes for the lara-zeus ecosystem. If values passed to a paragraph widget are not valid and contain a ... Read more
Affected Products :- Published: Oct. 07, 2024
- Modified: Oct. 10, 2024
-
6.5
MEDIUMCVE-2024-21533
All versions of the package ggit are vulnerable to Arbitrary Argument Injection via the clone() API, which allows specifying the remote URL to clone and the file on disk to clone to. The library does not sanitize for user input or validate a given URL sch... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
9.8
CRITICALCVE-2024-45873
A DLL hijacking vulnerability in VegaBird Yaazhini 2.0.2 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Yaazhini.exe.... Read more
Affected Products :- Published: Oct. 07, 2024
- Modified: Oct. 10, 2024
-
7.3
HIGHCVE-2024-47610
InvenTree is an Open Source Inventory Management System. In affected versions of InvenTree it is possible for a registered user to store javascript in markdown notes fields, which are then displayed to other logged in users who visit the same page and exe... Read more
Affected Products : inventree- Published: Oct. 07, 2024
- Modified: Oct. 10, 2024
-
8.3
HIGHCVE-2024-47555
Missing Authentication - User & System Configuration... Read more
Affected Products : freeflow_core- Published: Oct. 07, 2024
- Modified: Oct. 10, 2024
-
9.8
CRITICALCVE-2024-45874
A DLL hijacking vulnerability in VegaBird Vooki 5.2.9 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Vooki.exe.... Read more
Affected Products :- Published: Oct. 07, 2024
- Modified: Oct. 10, 2024
-
6.4
MEDIUMCVE-2024-47079
Meshtastic is an open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices. Meshtastic firmware is an open source firmware implementation for the broader project. The remote hardware module of the firmware does not h... Read more
- Published: Oct. 07, 2024
- Modified: Oct. 10, 2024
-
5.1
MEDIUMCVE-2024-47095
Cross Site Scripting vulnerability in Follet School Solutions Destiny before v22.0.1 AU1 allows a remote attacker to run arbitrary client-side code via the expiredSupportMessage parameter of handleloginform.do.... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
7.3
HIGHCVE-2024-3506
A possible buffer overflow in selected cameras' drivers from XProtect Device Pack can allow an attacker with access to internal network to execute commands on Recording Server under strict conditions.... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
4.3
MEDIUMCVE-2024-8431
The Photo Gallery, Images, Slider in Rbs Image Gallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajaxGetGalleryJson() function in all versions up to, and including, 3.2.21. This makes it pos... Read more
Affected Products : robo_gallery- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
7.5
HIGHCVE-2024-25885
An issue in the getcolor function in utils.py of xhtml2pdf v0.2.13 allows attackers to cause a Regular expression Denial of Service (ReDOS) via supplying a crafted string.... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
9.8
CRITICALCVE-2024-3057
A flaw exists whereby a user can make a specific call to a FlashArray endpoint allowing privilege escalation.... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
4.9
MEDIUMCVE-2024-36814
An arbitrary file read vulnerability in Adguard Home before v0.107.52 allows authenticated attackers to access arbitrary files as root on the underlying Operating System via placing a crafted file into a readable directory.... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
5.1
MEDIUMCVE-2024-46886
The web server of affected devices does not properly validate input that is used for a user redirection. This could allow an attacker to make the server redirect the legitimate user to an attacker-chosen URL. For a successful exploit, the legitimate user ... Read more
Affected Products : simatic_drive_controller_cpu_1504d_tf_firmware simatic_drive_controller_cpu_1507d_tf_firmware simatic_s7-1500_cpu_1510sp_f-1_pn_firmware simatic_s7-1500_cpu_1510sp-1_pn_firmware simatic_s7-1500_cpu_1511-1_pn_firmware simatic_s7-1500_cpu_1511c-1_pn_firmware simatic_s7-1500_cpu_1511f-1_pn_firmware simatic_s7-1500_cpu_1511t-1_pn_firmware simatic_s7-1500_cpu_1511tf-1_pn_firmware simatic_s7-1500_cpu_1512c-1_pn_firmware +55 more products- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024