Latest CVE Feed
-
8.0
HIGHCVE-2024-42845
An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.... Read more
Affected Products :- Published: Aug. 23, 2024
- Modified: Aug. 28, 2024
-
9.8
CRITICALCVE-2024-34087
An SEH-based buffer overflow in the BPQ32 HTTP Server in BPQ32 6.0.24.1 allows remote attackers with access to the Web Terminal to achieve remote code execution via an HTTP POST /TermInput request.... Read more
Affected Products :- Published: Aug. 26, 2024
- Modified: Aug. 28, 2024
-
9.8
CRITICALCVE-2024-7940
The product exposes a service that is intended for local only to all network interfaces without any authentication.... Read more
Affected Products : microscada_x_sys600- Published: Aug. 27, 2024
- Modified: Aug. 28, 2024
-
8.8
HIGHCVE-2024-41657
Casdoor is a UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform. In Casdoor 1.577.0 and earlier, a logic vulnerability exists in the beego filter CorsFilter that allows any website to make cross domain requests to Casdoor as the... Read more
Affected Products : casdoor- Published: Aug. 20, 2024
- Modified: Aug. 28, 2024
-
6.1
MEDIUMCVE-2024-41658
Casdoor is a UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform. In Casdoor 1.577.0 and earlier, he purchase URL that is created to generate a WechatPay QR code is vulnerable to reflected XSS. When purchasing an item through ca... Read more
Affected Products : casdoor- Published: Aug. 20, 2024
- Modified: Aug. 28, 2024
-
8.0
HIGHCVE-2022-39997
A weak password requirement issue was discovered in Teldats Router RS123, RS123w allows a remote attacker to escalate privileges... Read more
- Published: Aug. 27, 2024
- Modified: Aug. 28, 2024
-
9.8
CRITICALCVE-2024-42361
Hertzbeat is an open source, real-time monitoring system. Hertzbeat 1.6.0 and earlier declares a /api/monitor/{monitorId}/metric/{metricFull} endpoint to download job metrics. In the process, it executes a SQL query with user-controlled data, allowing for... Read more
Affected Products : hertzbeat- Published: Aug. 20, 2024
- Modified: Aug. 28, 2024
-
8.8
HIGHCVE-2024-42362
Hertzbeat is an open source, real-time monitoring system. Hertzbeat has an authenticated (user role) RCE via unsafe deserialization in /api/monitors/import. This vulnerability is fixed in 1.6.0.... Read more
Affected Products : hertzbeat- Published: Aug. 20, 2024
- Modified: Aug. 28, 2024
-
6.4
MEDIUMCVE-2024-45037
The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormation templates during deployment to a customer’s AWS accou... Read more
Affected Products :- Published: Aug. 27, 2024
- Modified: Aug. 28, 2024
-
7.5
HIGHCVE-2024-45049
Hydra is a Continuous Integration service for Nix based projects. It is possible to trigger evaluations in Hydra without any authentication. Depending on the size of evaluations, this can impact the availability of systems. The problem can be fixed by app... Read more
Affected Products :- Published: Aug. 27, 2024
- Modified: Aug. 28, 2024
-
7.5
HIGHCVE-2024-45038
Meshtastic device firmware is a firmware for meshtastic devices to run an open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices. Meshtastic device firmware is subject to a denial of serivce vulnerability in MQTT ... Read more
- Published: Aug. 27, 2024
- Modified: Aug. 28, 2024
-
5.1
MEDIUMCVE-2024-5814
A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server h... Read more
Affected Products : wolfssl- Published: Aug. 27, 2024
- Modified: Aug. 28, 2024
-
5.9
MEDIUMCVE-2024-5288
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS connectio... Read more
Affected Products : wolfssl- Published: Aug. 27, 2024
- Modified: Aug. 28, 2024
-
4.1
MEDIUMCVE-2024-1544
Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the elliptic curve. Meaning k = r mod n. The division used during the reduction estimates a factor q_e by d... Read more
Affected Products : wolfssl- Published: Aug. 27, 2024
- Modified: Aug. 28, 2024
-
5.3
MEDIUMCVE-2024-7573
The Relevanssi Live Ajax Search plugin for WordPress is vulnerable to argument injection in all versions up to, and including, 2.4. This is due to insufficient validation of input supplied via POST data in the 'search' function. This makes it possible for... Read more
Affected Products :- Published: Aug. 28, 2024
- Modified: Aug. 28, 2024
-
5.9
MEDIUMCVE-2024-7608
An authenticated user can access the restricted files from NX, EX, FX, AX, IVX and CMS using path traversal.... Read more
Affected Products :- Published: Aug. 27, 2024
- Modified: Aug. 28, 2024
-
6.1
MEDIUMCVE-2024-39097
There is an Open Redirect vulnerability in Gnuboard v6.0.4 and below via the `url` parameter in login path.... Read more
Affected Products :- Published: Aug. 26, 2024
- Modified: Aug. 27, 2024
-
8.8
HIGHCVE-2024-6978
Cato Networks Windows SDP Client Local root certificates can be installed by low-privileged users.This issue affects SDP Client: before 5.10.28.... Read more
Affected Products : cato_client- Published: Jul. 31, 2024
- Modified: Aug. 27, 2024
-
7.8
HIGHCVE-2022-48913
In the Linux kernel, the following vulnerability has been resolved: blktrace: fix use after free for struct blk_trace When tracing the whole disk, 'dropped' and 'msg' will be created under 'q->debugfs_dir' and 'bt->dir' is NULL, thus blk_trace_free() wo... Read more
Affected Products : linux_kernel- Published: Aug. 22, 2024
- Modified: Aug. 27, 2024
-
7.8
HIGHCVE-2022-48912
In the Linux kernel, the following vulnerability has been resolved: netfilter: fix use-after-free in __nf_register_net_hook() We must not dereference @new_hooks after nf_hook_mutex has been released, because other threads might have freed our allocated ... Read more
Affected Products : linux_kernel- Published: Aug. 22, 2024
- Modified: Aug. 27, 2024