Latest CVE Feed
-
6.1
MEDIUMCVE-2024-9232
The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.9.1. This makes it p... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.4
MEDIUMCVE-2024-9051
The WP Ultimate Post Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpupg-grid-with-filters shortcode in all versions up to, and including, 3.9.3 due to insufficient input sanitization and output escaping on user s... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
4.9
MEDIUMCVE-2024-9507
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 2.15.2 due to improper input valida... Read more
Affected Products : contact_form_builder- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.7
HIGHCVE-2024-47504
An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos). When a non-clustered S... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.2
HIGHCVE-2024-47490
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network based attacker to cause increased consump... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-47508
An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.2
HIGHCVE-2024-8531
CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that could compromise the Data Center Expert software when an upgrade bundle is manipulated to include arbitrary bash scripts that are executed as root.... Read more
Affected Products : data_center_expert- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.8
MEDIUMCVE-2024-47501
A NULL Pointer Dereference vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C allows a locally authenticated attacker with low privileges to cause a Denial of Se... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-47505
An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
5.1
MEDIUMCVE-2024-39544
An Incorrect Default Permissions vulnerability in the command line interface (CLI) of Juniper Networks Junos OS Evolved allows a low privileged local attacker to view NETCONF traceoptions files, representing an exposure of sensitive information. On all... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.7
HIGHCVE-2024-47497
An Uncontrolled Resource Consumption vulnerability in the http daemon (httpd) of Juniper Networks Junos OS on SRX Series, QFX Series, MX Series and EX Series allows an unauthenticated, network-based attacker to cause Denial-of-Service (DoS). An attacker ... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.8
MEDIUMCVE-2024-39527
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of pro... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
5.9
MEDIUMCVE-2024-8530
CWE-306: Missing Authentication for Critical Function vulnerability exists that could cause exposure of private data when an already generated “logcaptures” archive is accessed directly by HTTPS.... Read more
Affected Products : data_center_expert- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.8
MEDIUMCVE-2024-47496
A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS allows a local, low-privileged attacker to cause a Denial-of-Service (DoS). When a specific command is executed, the pfe crashes. This will cause ... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
10.0
CRITICALCVE-2024-47875
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3.... Read more
Affected Products : dompurify- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-47498
An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). Several configuration statements meant to enfor... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.2
HIGHCVE-2024-47494
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the AgentD process of Juniper Networks Junos OS allows an attacker who is already causing impact to established sessions which generates counter changes picked up by the AgentD process d... Read more
Affected Products : junos- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
7.1
HIGHCVE-2024-39526
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved on PTX... Read more
- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.9
MEDIUMCVE-2024-47507
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an integrity impact to the downstream d... Read more
- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.4
HIGHCVE-2024-47495
An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. This i... Read more
Affected Products : junos_os_evolved- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024