US-CERT Vulnerability Summary for the Week of June 10, 2024
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
High Vulnerabilities
Primary Vendor — Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
actpro — extra_product_options_for_woocommerce | Missing Authorization vulnerability in actpro Extra Product Options for WooCommerce.This issue affects Extra Product Options for WooCommerce: from n/a through 3.0.6. | 2024-06-10 | 8.8 | CVE-2024-35727 [email protected] |
adfinis–document-merge-service | Document Merge Service is a document template merge service providing an API to manage templates and merge them with given data. Versions 6.5.1 and prior are vulnerable to remote code execution via server-side template injection which, when executed as root, can result in full takeover of the affected system. As of time of publication, no patched version exists, nor have any known workarounds been disclosed. | 2024-06-11 | 9.9 | CVE-2024-37301 [email protected] [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference (‘XXE’) vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction. | 2024-06-13 | 9.8 | CVE-2024-34102 [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but admin privileges are required | 2024-06-13 | 9.1 | CVE-2024-34108 [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access or elevated privileges within the application. Exploitation of this issue does not require user interaction, but attack complexity is high. | 2024-06-13 | 8.1 | CVE-2024-34103 [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access, leading to both confidentiality and integrity impact. Exploitation of this issue does not require user interaction. | 2024-06-13 | 8.2 | CVE-2024-34104 [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but admin privileges are required. | 2024-06-13 | 7.2 | CVE-2024-34109 [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution. A high-privilege attacker could exploit this vulnerability by uploading a malicious file to the system, which could then be executed. Exploitation of this issue does not require user interaction. | 2024-06-13 | 7.2 | CVE-2024-34110 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. | 2024-06-13 | 7.5 | CVE-2024-26029 [email protected] |
Adobe–Adobe Framemaker Publishing Server | Adobe Framemaker Publishing Server versions 2020.3, 2022.2 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access or elevated privileges within the application. Exploitation of this issue does not require user interaction. | 2024-06-13 | 10 | CVE-2024-30299 [email protected] |
Adobe–Adobe Framemaker Publishing Server | Adobe Framemaker Publishing Server versions 2020.3, 2022.2 and earlier are affected by an Information Exposure vulnerability (CWE-200) that could lead to privilege escalation. An attacker could exploit this vulnerability to gain access to sensitive information which may include system or user privileges. Exploitation of this issue does not require user interaction. | 2024-06-13 | 9.8 | CVE-2024-30300 [email protected] |
Adobe–ColdFusion | ColdFusion versions 2023u7, 2021u13 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could exploit this vulnerability to gain unauthorized access to sensitive files or data. Exploitation of this issue does not require user interaction. | 2024-06-13 | 7.5 | CVE-2024-34112 [email protected] |
Adobe–Photoshop Desktop | Photoshop Desktop versions 24.7.3, 25.7 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2024-06-13 | 7.8 | CVE-2024-20753 [email protected] |
Adobe–Substance3D – Stager | Substance3D – Stager versions 2.1.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2024-06-13 | 7.8 | CVE-2024-34115 [email protected] |
aimeos–aimeos-core | Aimeos is an Open Source e-commerce framework for online shops. Starting in version 2024.01.1 and prior to version 2024.04.5, a user with administrative privileges can upload files that look like images but contain PHP code which can then be executed in the context of the web server. Version 2024.04.5 fixes the issue. | 2024-06-11 | 7.2 | CVE-2024-37295 [email protected] |
apple — macos | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4, macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to break out of its sandbox. | 2024-06-10 | 8.6 | CVE-2024-23299 [email protected] [email protected] [email protected] |
apple — macos | A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.5. Processing a maliciously crafted tiff file may lead to arbitrary code execution. | 2024-06-10 | 7.8 | CVE-2022-32897 [email protected] |
apple — macos | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.5. Processing an AppleScript may result in unexpected termination or disclosure of process memory. | 2024-06-10 | 7.1 | CVE-2022-48578 [email protected] |
apple — macos | An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13. An app may be able to break out of its sandbox. | 2024-06-10 | 7.8 | CVE-2022-48683 [email protected] |
arraytics–WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin | The Timetics- AI-powered Appointment Booking with Visual Seat Plan and ultimate Calendar Scheduling plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the make_staff() function in all versions up to, and including, 1.0.21. This makes it possible for unauthenticated attackers to grant users staff permissions. | 2024-06-14 | 7.3 | CVE-2024-1094 [email protected] [email protected] |
Aruphash–Crafthemes Demo Import | Missing Authentication for Critical Function vulnerability in Aruphash Crafthemes Demo Import allows Functionality Misuse.This issue affects Crafthemes Demo Import: from n/a through 3.3. | 2024-06-10 | 7.6 | CVE-2024-34800 [email protected] |
arwebdesign — dashboard_to-do_list | Missing Authorization vulnerability in Andrew Rapps Dashboard To-Do List.This issue affects Dashboard To-Do List: from n/a through 1.2.0. | 2024-06-10 | 8.8 | CVE-2024-35723 [email protected] |
ASUS–Download Master | The upload functionality of ASUS Download Master does not properly filter user input. Remote attackers with administrative privilege can exploit this vulnerability to upload any file to any location. They may even upload malicious web page files to the website directory, allowing arbitrary system commands to be executed upon browsing the webpage. | 2024-06-14 | 7.2 | CVE-2024-31161 [email protected] [email protected] |
ASUS–Download Master | The specific function parameter of ASUS Download Master does not properly filter user input. An unauthenticated remote attacker with administrative privileges can exploit this vulnerability to execute arbitrary system commands on the device. | 2024-06-14 | 7.2 | CVE-2024-31162 [email protected] [email protected] |
ASUS–Download Master | ASUS Download Master has a buffer overflow vulnerability. An unauthenticated remote attacker with administrative privileges can exploit this vulnerability to execute arbitrary system commands on the device. | 2024-06-14 | 7.2 | CVE-2024-31163 [email protected] [email protected] |
ASUS–DSL-N17U | Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device. | 2024-06-14 | 9.8 | CVE-2024-3912 [email protected] [email protected] |
ASUS–ZenWiFi XT8 | Certain ASUS router models have authentication bypass vulnerability, allowing unauthenticated remote attackers to log in the device. | 2024-06-14 | 9.8 | CVE-2024-3080 [email protected] [email protected] |
ASUS–ZenWiFi XT8 | Certain models of ASUS routers have buffer overflow vulnerabilities, allowing remote attackers with administrative privileges to execute arbitrary commands on the device. | 2024-06-14 | 7.2 | CVE-2024-3079 [email protected] [email protected] |
avast — antivirus | A sym-linked file accessed via the repair function in Avast Antivirus <24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\SYSTEM. The vulnerability exists within the “Repair” (settings -> troubleshooting -> repair) feature, which attempts to delete a file in the current user’s AppData directory as NT AUTHORITY\SYSTEM. A low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance. This issue affects Avast Antivirus prior to 24.2. | 2024-06-10 | 7 | CVE-2024-5102 [email protected] |
awplife — image_gallery | Missing Authorization vulnerability in A WP Life Image Gallery – Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery.This issue affects Image Gallery – Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery: from n/a through 1.4.5. | 2024-06-10 | 8.8 | CVE-2024-35721 [email protected] |
awplife — slider_responsive_slideshow | Missing Authorization vulnerability in A WP Life Slider Responsive Slideshow – Image slider, Gallery slideshow.This issue affects Slider Responsive Slideshow – Image slider, Gallery slideshow: from n/a through 1.4.0. | 2024-06-10 | 8.8 | CVE-2024-35722 [email protected] |
awslabs–aws-deployment-framework | The AWS Deployment Framework (ADF) is a framework to manage and deploy resources across multiple AWS accounts and regions within an AWS Organization. ADF allows for staged, parallel, multi-account, cross-region deployments of applications or resources via the structure defined in AWS Organizations while taking advantage of services such as AWS CodePipeline, AWS CodeBuild, and AWS CodeCommit to alleviate the heavy lifting and management compared to a traditional CI/CD setup. ADF contains a bootstrap process that is responsible to deploy ADF’s bootstrap stacks to facilitate multi-account cross-region deployments. The ADF bootstrap process relies on elevated privileges to perform this task. Two versions of the bootstrap process exist; a code-change driven pipeline using AWS CodeBuild and an event-driven state machine using AWS Lambda. If an actor has permissions to change the behavior of the CodeBuild project or the Lambda function, they would be able to escalate their privileges. Prior to version 4.0.0, the bootstrap CodeBuild role provides access to the `sts:AssumeRole` operation without further restrictions. Therefore, it is able to assume into any AWS Account in the AWS Organization with the elevated privileges provided by the cross-account access role. By default, this role is not restricted when it is created by AWS Organizations, providing Administrator level access to the AWS resources in the AWS Account. The patches for this issue are included in `aws-deployment-framework` version 4.0.0. As a temporary mitigation, add a permissions boundary to the roles created by ADF in the management account. The permissions boundary should deny all IAM and STS actions. This permissions boundary should be in place until you upgrade ADF or bootstrap a new account. While the permissions boundary is in place, the account management and bootstrapping of accounts are unable to create, update, or assume into roles. This mitigates the privilege escalation risk, but also disables ADF’s ability to create, manage, and bootstrap accounts. | 2024-06-11 | 7.5 | CVE-2024-37293 [email protected] [email protected] [email protected] [email protected] |
BlackBerry–QNX Software Development Platform | An improper input validation vulnerability in the SGI Image Codec of QNX SDP version(s) 6.6, 7.0, and 7.1 could allow an attacker to potentially cause a denial-of-service condition or execute code in the context of the image processing process. | 2024-06-11 | 9 | CVE-2024-35213 [email protected] |
bosathemes — bosa_elementor_addons_and_templates_for_woocommerce | Missing Authorization vulnerability in Bosa Themes Bosa Elementor Addons and Templates for WooCommerce.This issue affects Bosa Elementor Addons and Templates for WooCommerce: from n/a through 1.0.12. | 2024-06-10 | 8.8 | CVE-2024-35724 [email protected] |
buddypress_cover_project — buddypress_cover | Unrestricted Upload of File with Dangerous Type vulnerability in Asghar Hatampoor BuddyPress Cover allows Code Injection.This issue affects BuddyPress Cover: from n/a through 2.1.4.2. | 2024-06-10 | 9.8 | CVE-2024-35746 [email protected] |
cilium–cilium | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.0 and prior to versions 1.13.7, 1.14.12, and 1.15.6, the output of `cilium-bugtool` can contain sensitive data when the tool is run (with the `–envoy-dump` flag set) against Cilium deployments with the Envoy proxy enabled. Users of the TLS inspection, Ingress with TLS termination, Gateway API with TLS termination, and Kafka network policies with API key filtering features are affected. The sensitive data includes the CA certificate, certificate chain, and private key used by Cilium HTTP Network Policies, and when using Ingress/Gateway API and the API keys used in Kafka-related network policy. `cilium-bugtool` is a debugging tool that is typically invoked manually and does not run during the normal operation of a Cilium cluster. This issue has been patched in Cilium v1.15.6, v1.14.12, and v1.13.17. There is no workaround to this issue. | 2024-06-13 | 7.9 | CVE-2024-37307 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
cloudfoundry — cf-deployment | Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade the service availability of the Cloud Foundry deployment if performed at scale. | 2024-06-10 | 7.5 | CVE-2024-22279 [email protected] |
codename065–Download Manager | The Download Manager plugin for WordPress is vulnerable to unauthorized access of data due to an improper authorization check on the ‘protectMediaLibrary’ function in all versions up to, and including, 3.2.89. This makes it possible for unauthenticated attackers to download password-protected files. | 2024-06-13 | 7.5 | CVE-2024-2098 [email protected] [email protected] |
codeparrots — easy_forms_for_mailchimp | Missing Authorization vulnerability in Code Parrots Easy Forms for Mailchimp.This issue affects Easy Forms for Mailchimp: from n/a through 6.9.0. | 2024-06-10 | 7.3 | CVE-2024-35742 [email protected] |
codepeople — wp_time_slots_booking_form | Missing Authorization vulnerability in CodePeople WP Time Slots Booking Form.This issue affects WP Time Slots Booking Form: from n/a through 1.2.11. | 2024-06-10 | 9.8 | CVE-2024-35735 [email protected] |
codexpert–CoDesigner The Most Compact and User-Friendly Elementor WooCommerce Builder | The CoDesigner WooCommerce Builder for Elementor – Customize Checkout, Shop, Email, Products & More plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.4.1 via deserialization of untrusted input from the recently_viewed_products cookie. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | 2024-06-13 | 9 | CVE-2024-4371 [email protected] [email protected] |
composer–composer | Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `status`, `reinstall` and `remove` commands with packages installed from source via git containing specially crafted branch names in the repository can be used to execute code. Patches for this issue are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid installing dependencies via git by using `–prefer-dist` or the `preferred-install: dist` config setting. | 2024-06-10 | 8.8 | CVE-2024-35241 [email protected] [email protected] [email protected] |
composer–composer | Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `composer install` command running inside a git/hg repository which has specially crafted branch names can lead to command injection. This requires cloning untrusted repositories. Patches are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid cloning potentially compromised repositories. | 2024-06-10 | 8.8 | CVE-2024-35242 [email protected] [email protected] [email protected] |
Comtrend–Comtrend WLD71-T1_v2.0.201820 | Command injection vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability could allow an authenticated user to execute commands inside the router by making a POST request to the URL “/boaform/admin/formUserTracert”. | 2024-06-10 | 8 | CVE-2024-5785 [email protected] |
Consensu.IO–Consensu.io | Missing Authorization vulnerability in Consensu.IO Consensu.Io.This issue affects Consensu.Io: from n/a through 1.0.1. | 2024-06-12 | 7.5 | CVE-2023-48280 [email protected] |
contrid–Slideshow Gallery LITE | The Slideshow Gallery LITE plugin for WordPress is vulnerable to time-based SQL Injection via the id parameter in all versions up to, and including, 1.8.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | 2024-06-12 | 8.1 | CVE-2024-5543 [email protected] [email protected] [email protected] |
cvat-ai–cvat | Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. CVAT allows users to supply custom endpoint URLs for cloud storages based on Amazon S3 and Azure Blob Storage. Starting in version 2.1.0 and prior to version 2.14.3, an attacker with a CVAT account can exploit this feature by specifying URLs whose host part is an intranet IP address or an internal domain name. By doing this, the attacker may be able to probe the network that the CVAT backend runs in for HTTP(S) servers. In addition, if there is a web server on this network that is sufficiently API-compatible with an Amazon S3 or Azure Blob Storage endpoint, and either allows anonymous access, or allows authentication with credentials that are known by the attacker, then the attacker may be able to create a cloud storage linked to this server. They may then be able to list files on the server; extract files from the server, if these files are of a type that CVAT supports reading from cloud storage (media data (such as images/videos/archives), importable annotations or datasets, task/project backups); and/or overwrite files on this server with exported annotations/datasets/backups. The exact capabilities of the attacker will depend on how the internal server is configured. Users should upgrade to CVAT 2.14.3 to receive a patch. In this release, the existing SSRF mitigation measures are applied to requests to cloud providers, with access to intranet IP addresses prohibited by default. Some workarounds are also available. One may use network security solutions such as virtual networks or firewalls to prohibit network access from the CVAT backend to unrelated servers on your internal network and/or require authentication for access to internal servers. | 2024-06-13 | 7.1 | CVE-2024-37164 [email protected] [email protected] |
cvat-ai–cvat | Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. Starting in version 2.2.0 and prior to version 2.14.3, if an attacker can trick a logged-in CVAT user into visiting a malicious URL, they can initiate a dataset export or a backup from a project, task or job that the victim user has permission to export into a cloud storage that the victim user has access to. The name of the resulting file can be chosen by the attacker. This implies that the attacker can overwrite arbitrary files in any cloud storage that the victim can access and, if the attacker has read access to the cloud storage used in the attack, they can obtain media files, annotations, settings and other information from any projects, tasks or jobs that the victim has permission to export. Version 2.14.3 contains a fix for the issue. No known workarounds are available. | 2024-06-13 | 7.1 | CVE-2024-37306 [email protected] [email protected] |
Dell–Common Event Enabler | Dell Common Event Enabler, version 8.9.10.0 and prior, contain an insecure deserialization vulnerability in CAVATools. A local unauthenticated attacker could potentially exploit this vulnerability, leading to arbitrary code execution in the context of the logged in user. Exploitation of this issue requires a victim to open a malicious file. | 2024-06-12 | 7.8 | CVE-2024-28964 [email protected] |
Dell–CPG BIOS | Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution. | 2024-06-13 | 7.5 | CVE-2024-32858 [email protected] |
Dell–CPG BIOS | Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution. | 2024-06-13 | 7.5 | CVE-2024-32859 [email protected] |
Dell–CPG BIOS | Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution. | 2024-06-13 | 7.5 | CVE-2024-32860 [email protected] |
Dell–Dell OpenManage Server Administrator | Dell OpenManage Server Administrator, versions 11.0.1.0 and prior, contains a Local Privilege Escalation vulnerability via XSL Hijacking. A local low-privileged malicious user could potentially exploit this vulnerability and escalate their privilege to the admin user and gain full control of the machine. Exploitation may lead to a complete system compromise. | 2024-06-11 | 7.3 | CVE-2024-37130 [email protected] |
Dell–Secure Connect Gateway (SCG) Policy Manager | SCG Policy Manager, all versions, contains an overly permissive Cross-Origin Resource Policy (CORP) vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious actions on the application in the context of the authenticated user. | 2024-06-13 | 7.5 | CVE-2024-37131 [email protected] |
Dell–SmartFabric OS10 Software | Dell OS10 Networking Switches, versions10.5.6.x, 10.5.5.x, 10.5.4.x and 10.5.3.x ,contain an improper authorization vulnerability. A remote authenticated attacker could potentially exploit this vulnerability leading to escalation of privileges. | 2024-06-12 | 8.8 | CVE-2024-25949 [email protected] |
Dell–Wyse 5070 Thin Client | Telemetry Dashboard v1.0.0.8 for Dell ThinOS 2402 contains a sensitive information disclosure vulnerability. An unauthenticated user with local access to the device could exploit this vulnerability leading to information disclosure. | 2024-06-13 | 7.5 | CVE-2024-30472 [email protected] |
dreryk — gabinet | Use of hard-coded password to the patients’ database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all drEryk Gabinet installations.This issue affects drEryk Gabinet software versions from 7.0.0.0 through 9.17.0.0. | 2024-06-10 | 9.8 | CVE-2024-3699 [email protected] [email protected] [email protected] |
estomed — simple_care | Use of hard-coded password to the patients’ database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Simple Care software installations. This issue affects Estomed Sp. z o.o. Simple Care software in all versions. The software is no longer supported. | 2024-06-10 | 9.8 | CVE-2024-3700 [email protected] [email protected] |
eurosoft — przychodnia | Use of hard-coded password to the patients’ database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Eurosoft Przychodnia installations. This issue affects Eurosoft Przychodnia software before version 20240417.001 (from that version vulnerability is fixed). | 2024-06-10 | 9.8 | CVE-2024-1228 [email protected] [email protected] [email protected] |
flightbycanto–Canto | The Canto plugin for WordPress is vulnerable to Remote File Inclusion in all versions up to, and including, 3.0.8 via the abspath parameter. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. This required allow_url_include to be enabled on the target site in order to exploit. | 2024-06-14 | 9.8 | CVE-2024-4936 [email protected] [email protected] |
FooEvents–FooEvents for WooCommerce | The FooEvents for WooCommerce plugin for WordPress is vulnerable to unauthorized arbitrary file uploads due to an improper capability setting on the ‘display_ticket_themes_page’ function in versions up to, and including, 1.19.20. This makes it possible for authenticated attackers with contributor-level capabilities or above, to upload arbitrary files on the affected site’s server which may make remote code execution possible. This was partially patched in 1.19.20, and fully patched in 1.19.21. | 2024-06-15 | 7.1 | CVE-2024-6000 [email protected] [email protected] |
Fortinet–FortiOS | A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands | 2024-06-11 | 7.8 | CVE-2024-23110 [email protected] |
Fortinet–FortiPAM | A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiWeb, FortiAuthenticator, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.1 through 7.0.3, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specially crafted packets. | 2024-06-11 | 7.5 | CVE-2024-26010 [email protected] |
Fuji Electric–Tellus Lite V-Simulator | Fuji Electric Tellus Lite V-Simulator is vulnerable to an out-of-bounds write, which could allow an attacker to manipulate memory, resulting in execution of arbitrary code. | 2024-06-13 | 7.8 | CVE-2024-37022 [email protected] |
Fuji Electric–Tellus Lite V-Simulator | Fuji Electric Tellus Lite V-Simulator is vulnerable to a stack-based buffer overflow, which could allow an attacker to execute arbitrary code. | 2024-06-13 | 7.8 | CVE-2024-37029 [email protected] |
fujielectric — monitouch_v-sft | Fuji Electric Monitouch V-SFTÂ is vulnerable to a type confusion, which could cause a crash or code execution. | 2024-06-10 | 9.8 | CVE-2024-5597 [email protected] |
getawesomesupport — awesome_support | Missing Authorization vulnerability in Awesome Support Team Awesome Support.This issue affects Awesome Support: from n/a through 6.1.7. | 2024-06-10 | 8.8 | CVE-2024-35741 [email protected] |
google — android | there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2024-06-13 | 7.8 | CVE-2024-32896 [email protected] |
Guangdong Baolun Electronics–IP Network Broadcasting Service Platform | A vulnerability was found in Guangdong Baolun Electronics IP Network Broadcasting Service Platform 2.0. It has been classified as critical. Affected is an unknown function of the file /api/v2/maps. The manipulation of the argument orderColumn leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268692. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | 2024-06-14 | 7.3 | CVE-2024-6003 [email protected] [email protected] [email protected] [email protected] |
gurgunday–ghtml | ghtml is software that uses tagged templates for template engine functionality. It is possible to introduce user-controlled JavaScript code and trigger a Cross-Site Scripting (XSS) vulnerability in some cases. Version 2.0.0 introduces changes to mitigate this issue. Version 2.0.0 contains updated documentation to clarify that while ghtml escapes characters with special meaning in HTML, it does not provide comprehensive protection against all types of XSS attacks in every scenario. This aligns with the approach taken by other template engines. Developers should be cautious and take additional measures to sanitize user input and prevent potential vulnerabilities. Additionally, the backtick character (`) is now also escaped to prevent the creation of strings in most cases where a malicious actor somehow gains the ability to write JavaScript. This does not provide comprehensive protection either. | 2024-06-10 | 8.9 | CVE-2024-37166 [email protected] [email protected] |
hakeemnala–Build App Online | The Build App Online plugin for WordPress is vulnerable to account takeover due to a weak password reset mechanism in all versions up to, and including, 1.0.21. This makes it possible for unauthenticated attackers to reset the password of arbitrary users by guessing an 4-digit numeric reset code. | 2024-06-11 | 8.1 | CVE-2023-7264 [email protected] [email protected] [email protected] |
Hitachi Energy–FOXMAN-UN | An authentication bypass vulnerability exists in the FOXMAN-UN/UNEM server / API Gateway component that if exploited allows attackers without any access to interact with the services and the post-authentication attack surface. | 2024-06-11 | 10 | CVE-2024-2013 [email protected] |
Hitachi Energy–FOXMAN-UN | vulnerability exists in the FOXMAN-UN/UNEM server / API Gateway that if exploited an attacker could use to allow unintended commands or code to be executed on the UNEM server allowing sensitive data to be read or modified or could cause other unintended behavior | 2024-06-11 | 9.1 | CVE-2024-2012 [email protected] |
Hitachi Energy–FOXMAN-UN | A heap-based buffer overflow vulnerability exists in the FOXMAN-UN/UNEM that if exploited will generally lead to a denial of service but can be used to execute arbitrary code, which is usually outside the scope of a program’s implicit security policy | 2024-06-11 | 8.6 | CVE-2024-2011 [email protected] [email protected] |
Hitachi Energy–FOXMAN-UN | A user/password reuse vulnerability exists in the FOXMAN-UN/UNEMÂ application and server management. If exploited a malicious user could use the passwords and login information to extend access on the server and other services. | 2024-06-11 | 8 | CVE-2024-28020 [email protected] [email protected] |
Hitachi Energy–FOXMAN-UN | A vulnerability exists in the FOXMAN-UN/UNEM server that affects the message queueing mechanism’s certificate validation. If exploited an attacker could spoof a trusted entity causing a loss of confidentiality and integrity. | 2024-06-11 | 8 | CVE-2024-28021 [email protected] [email protected] |
Huawei–HarmonyOS | Privilege escalation vulnerability in the AMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 2024-06-14 | 7.8 | CVE-2024-36500 [email protected] |
Huawei–HarmonyOS | Out-of-bounds read vulnerability in the audio module Impact: Successful exploitation of this vulnerability will affect availability. | 2024-06-14 | 7.9 | CVE-2024-36502 [email protected] |
Huawei–HarmonyOS | Memory management vulnerability in the Gralloc module Impact: Successful exploitation of this vulnerability will affect availability. | 2024-06-14 | 7.3 | CVE-2024-36503 [email protected] |
IBM–i | IBM i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability caused by an insufficient authority requirement. A local user without administrator privilege can configure a physical file trigger to execute with the privileges of a user socially engineered to access the target file. The correction is to require administrator privilege to configure trigger support. IBM X-Force ID: 285203. | 2024-06-15 | 7.4 | CVE-2024-27275 [email protected] [email protected] |
icegram–Email Subscribers by Icegram Express Email Marketing, Newsletters, Automation for WordPress & WooCommerce | The Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘options[list_id]’ parameter in all versions up to, and including, 5.7.22 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | 2024-06-12 | 8.8 | CVE-2024-4845 [email protected] [email protected] |
instawp–InstaWP Connect 1-click WP Staging & Migration | The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary option updates due to a missing authorization checks on the REST API calls in all versions up to, and including, 0.1.0.38. This makes it possible for unauthenticated attackers to connect the site to InstaWP API, edit arbitrary site options and create administrator accounts. | 2024-06-12 | 9.8 | CVE-2024-4898 [email protected] [email protected] |
ipages_flipbook_project — ipages_flipbook | Missing Authorization vulnerability in Avirtum iPages Flipbook.This issue affects iPages Flipbook: from n/a through 1.5.1. | 2024-06-10 | 7.3 | CVE-2024-4744 [email protected] |
itsourcecode–Online Bookstore | A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bookPerPub.php. The manipulation of the argument pubid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268459. | 2024-06-14 | 7.3 | CVE-2024-5983 [email protected] [email protected] [email protected] [email protected] |
itsourcecode–Online Bookstore | A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file book.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268460. | 2024-06-14 | 7.3 | CVE-2024-5984 [email protected] [email protected] [email protected] [email protected] |
jetbrains — aqua | GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4 | 2024-06-10 | 7.5 | CVE-2024-37051 [email protected] |
jupyterhub–jupyter-server-proxy | Jupyter Server Proxy allows users to run arbitrary external processes alongside their notebook server and provide authenticated web access to them. Versions of 3.x prior to 3.2.4 and 4.x prior to 4.2.0 have a reflected cross-site scripting (XSS) issue. The `/proxy` endpoint accepts a `host` path segment in the format `/proxy/<host>`. When this endpoint is called with an invalid `host` value, `jupyter-server-proxy` replies with a response that includes the value of `host`, without sanitization [2]. A third-party actor can leverage this by sending a phishing link with an invalid `host` value containing custom JavaScript to a user. When the user clicks this phishing link, the browser renders the response of `GET /proxy/<host>`, which runs the custom JavaScript contained in `host` set by the actor. As any arbitrary JavaScript can be run after the user clicks on a phishing link, this issue permits extensive access to the user’s JupyterLab instance for an actor. Patches are included in versions 4.2.0 and 3.2.4. As a workaround, server operators who are unable to upgrade can disable the `jupyter-server-proxy` extension. | 2024-06-11 | 9.6 | CVE-2024-35225 [email protected] [email protected] [email protected] [email protected] |
jupyterhub–oauthenticator | OAuthenticator is software that allows OAuth2 identity providers to be plugged in and used with JupyterHub. JupyterHub < 5.0, when used with `GlobusOAuthenticator`, could be configured to allow all users from a particular institution only. This worked fine prior to JupyterHub 5.0, because `allow_all` did not take precedence over `identity_provider`. Since JupyterHub 5.0, `allow_all` does take precedence over `identity_provider`. On a hub with the same config, now all users will be allowed to login, regardless of `identity_provider`. `identity_provider` will basically be ignored. This is a documented change in JupyterHub 5.0, but is likely to catch many users by surprise. OAuthenticator 16.3.1 fixes the issue with JupyterHub 5.0, and does not affect previous versions. As a workaround, do not upgrade to JupyterHub 5.0 when using `GlobusOAuthenticator` in the prior configuration. | 2024-06-12 | 8.1 | CVE-2024-37300 [email protected] [email protected] [email protected] |
la-studioweb — element_kit_for_elementor | Missing Authorization vulnerability in LA-Studio LA-Studio Element Kit for Elementor.This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.3.6. | 2024-06-10 | 8.8 | CVE-2024-35725 [email protected] |
langflow — langflow | Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the “POST /api/v1/custom_component” endpoint and provide a Python script. | 2024-06-10 | 9.8 | CVE-2024-37014 [email protected] |
latepoint–LatePoint Plugin | The LatePoint Plugin plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the ‘start_or_use_session_for_customer’ function in all versions up to and including 4.9.9. This makes it possible for unauthenticated attackers to view other customer’s cabinets, including the ability to view PII such as email addresses and to change their LatePoint user password, which may or may not be associated with a WordPress account. | 2024-06-14 | 9.1 | CVE-2024-2472 [email protected] [email protected] [email protected] |
Lenovo–Service Bridge | A privilege escalation vulnerability was reported in Lenovo Service Bridge prior to version 5.0.2.17 that could allow operating system commands to be executed if a specially crafted link is visited. | 2024-06-13 | 7.5 | CVE-2024-4696 [email protected] |
linux — linux_kernel | In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets. | 2024-06-10 | 7.8 | CVE-2024-36971 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
lnbits–lnbits | LNbits is a Lightning wallet and accounts system. Paying invoices in Eclair that do not get settled within the internal timeout (about 30s) lead to a payment being considered failed, even though it may still be in flight. This vulnerability can lead to a total loss of funds for the node backend. This vulnerability is fixed in 0.12.6. | 2024-06-14 | 8.1 | CVE-2024-34694 [email protected] |
mcnardelli–Where I Was, Where I Will Be | The Where I Was, Where I Will Be plugin for WordPress is vulnerable to Remote File Inclusion in version <= 1.1.1 via the WIW_HEADER parameter of the /system/include/include_user.php file. This makes it possible for unauthenticated attackers to include and execute arbitrary files hosted on external servers, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution. This requires allow_url_include to be set to true in order to exploit, which is not commonly enabled. | 2024-06-14 | 9.8 | CVE-2024-5577 [email protected] [email protected] |
melapress — melapress_login_security | Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’) vulnerability in Melapress MelaPress Login Security allows PHP Remote File Inclusion.This issue affects MelaPress Login Security: from n/a through 1.3.0. | 2024-06-10 | 7.2 | CVE-2024-35650 [email protected] |
MicroDicom–DICOM Viewer | MicroDicom DICOM Viewer is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code on affected installations of DICOM Viewer. User interaction is required to exploit this vulnerability. | 2024-06-11 | 8.8 | CVE-2024-28877 [email protected] |
MicroDicom–DICOM Viewer | An attacker could retrieve sensitive files (medical images) as well as plant new medical images or overwrite existing medical images on a MicroDicom DICOM Viewer system. User interaction is required to exploit this vulnerability. | 2024-06-11 | 8.8 | CVE-2024-33606 [email protected] |
microsoft — windows_10_1507 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | 2024-06-11 | 9.8 | CVE-2024-30080 [email protected] |
Microsoft–Azure Data Science Virtual Machines | Azure Science Virtual Machine (DSVM) Elevation of Privilege Vulnerability | 2024-06-11 | 8.1 | CVE-2024-37325 [email protected] |
Microsoft–Azure Monitor | Azure Monitor Agent Elevation of Privilege Vulnerability | 2024-06-11 | 7.1 | CVE-2024-35254 [email protected] |
Microsoft–Azure Storage | Azure Storage Movement Client Library Denial of Service Vulnerability | 2024-06-11 | 7.5 | CVE-2024-35252 [email protected] |
Microsoft–Microsoft 365 Apps for Enterprise | Microsoft Office Remote Code Execution Vulnerability | 2024-06-11 | 7.5 | CVE-2024-30101 [email protected] |
Microsoft–Microsoft 365 Apps for Enterprise | Microsoft Office Remote Code Execution Vulnerability | 2024-06-11 | 7.3 | CVE-2024-30102 [email protected] |
Microsoft–Microsoft Dynamics 365 Business Central 2023 Release Wave 1 | Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability | 2024-06-11 | 7.3 | CVE-2024-35248 [email protected] |
Microsoft–Microsoft Dynamics 365 Business Central 2024 Release Wave 1 | Microsoft Dynamics 365 Business Central Remote Code Execution Vulnerability | 2024-06-11 | 8.8 | CVE-2024-35249 [email protected] |
Microsoft–Microsoft Office 2019 | Microsoft Outlook Remote Code Execution Vulnerability | 2024-06-11 | 8.8 | CVE-2024-30103 [email protected] |
Microsoft–Microsoft Office 2019 | Microsoft Office Remote Code Execution Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30104 [email protected] |
Microsoft–Microsoft SharePoint Enterprise Server 2016 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30100 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Kernel Elevation of Privilege Vulnerability | 2024-06-11 | 8.8 | CVE-2024-30068 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows OLE Remote Code Execution Vulnerability | 2024-06-11 | 8 | CVE-2024-30077 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Wi-Fi Driver Remote Code Execution Vulnerability | 2024-06-11 | 8.8 | CVE-2024-30078 [email protected] |
Microsoft–Windows 10 Version 1809 | Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability | 2024-06-11 | 8.8 | CVE-2024-30097 [email protected] |
Microsoft–Windows 10 Version 1809 | Win32k Elevation of Privilege Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30082 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | 2024-06-11 | 7 | CVE-2024-30084 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30086 [email protected] |
Microsoft–Windows 10 Version 1809 | Win32k Elevation of Privilege Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30087 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Kernel Elevation of Privilege Vulnerability | 2024-06-11 | 7 | CVE-2024-30088 [email protected] |
Microsoft–Windows 10 Version 1809 | Microsoft Streaming Service Elevation of Privilege Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30089 [email protected] |
Microsoft–Windows 10 Version 1809 | Microsoft Streaming Service Elevation of Privilege Vulnerability | 2024-06-11 | 7 | CVE-2024-30090 [email protected] |
Microsoft–Windows 10 Version 1809 | Win32k Elevation of Privilege Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30091 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Storage Elevation of Privilege Vulnerability | 2024-06-11 | 7.3 | CVE-2024-30093 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30094 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30095 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Kernel Elevation of Privilege Vulnerability | 2024-06-11 | 7 | CVE-2024-30099 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | 2024-06-11 | 7.8 | CVE-2024-35250 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Perception Service Elevation of Privilege Vulnerability | 2024-06-11 | 7 | CVE-2024-35265 [email protected] |
Microsoft–Windows 11 version 21H2 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30085 [email protected] |
Microsoft–Windows 11 version 22H2 | Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30072 [email protected] |
Microsoft–Windows Server 2008 Service Pack 2 | Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability | 2024-06-11 | 8 | CVE-2024-30074 [email protected] |
Microsoft–Windows Server 2008 Service Pack 2 | Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability | 2024-06-11 | 8 | CVE-2024-30075 [email protected] |
Microsoft–Windows Server 2019 | Windows Standards-Based Storage Management Service Remote Code Execution Vulnerability | 2024-06-11 | 7.8 | CVE-2024-30062 [email protected] |
Microsoft–Windows Server 2019 | DHCP Server Service Denial of Service Vulnerability | 2024-06-11 | 7.5 | CVE-2024-30070 [email protected] |
Microsoft–Windows Server 2019 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | 2024-06-11 | 7.5 | CVE-2024-30083 [email protected] |
Microsoft–Windows Server 2022 | Windows Kernel Elevation of Privilege Vulnerability | 2024-06-11 | 8.8 | CVE-2024-30064 [email protected] |
MultiVendorX–WC Marketplace | Missing Authorization vulnerability in MultiVendorX WC Marketplace.This issue affects WC Marketplace: from n/a through 4.0.25. | 2024-06-11 | 8.6 | CVE-2024-24703 [email protected] |
n/a–n/a | An issue was discovered in Samsung Mobile Processor Exynos 2200, Exynos 1480, Exynos 2400. It lacks proper buffer length checking, which can result in an Out-of-Bounds Write. | 2024-06-13 | 8.4 | CVE-2024-31956 [email protected] |
n/a–n/a | An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. The mobile processor lacks proper length checking, which can result in an OOB (Out-of-Bounds) Write vulnerability. | 2024-06-13 | 8.4 | CVE-2024-32504 [email protected] |
nextcloud–security-advisories | Nextcloud Server is a self hosted personal cloud system. A recipient of a share with read&share permissions could reshare the item with more permissions. It is recommended that the Nextcloud Server is upgraded to 26.0.13 or 27.1.8 or 28.0.4 and that the Nextcloud Enterprise Server is upgraded to 26.0.13 or 27.1.8 or 28.0.4. | 2024-06-14 | 8.1 | CVE-2024-37882 [email protected] [email protected] [email protected] |
nextcloud–security-advisories | Nextcloud server is a self hosted personal cloud system. Under some circumstance it was possible to bypass the second factor of 2FA after successfully providing the user credentials. It is recommended that the Nextcloud Server is upgraded to 26.0.13, 27.1.8 or 28.0.4 and Nextcloud Enterprise Server is upgraded to 21.0.9.17, 22.2.10.22, 23.0.12.17, 24.0.12.13, 25.0.13.8, 26.0.13, 27.1.8 or 28.0.4. | 2024-06-14 | 7.3 | CVE-2024-37313 [email protected] [email protected] [email protected] |
nvidia–GPU display driver, vGPU software, and Cloud Gaming | NVIDIA GPU Display Driver for Windows contains a vulnerability where the information from a previous client or another process could be disclosed. A successful exploit of this vulnerability might lead to code execution, information disclosure, or data tampering. | 2024-06-13 | 7.8 | CVE-2024-0089 [email protected] |
nvidia–GPU display driver, vGPU software, and Cloud Gaming | NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | 2024-06-13 | 7.8 | CVE-2024-0090 [email protected] |
nvidia–GPU display driver, vGPU software, and Cloud Gaming | NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering. | 2024-06-13 | 7.8 | CVE-2024-0091 [email protected] |
nvidia–NVIDIA Triton Inference Server | NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where a user can inject forged logs and executable commands by injecting arbitrary data as a new log entry. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | 2024-06-13 | 9 | CVE-2024-0095 [email protected] |
nvidia–vGPU software and Cloud Gaming | NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could execute privileged operations. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service. | 2024-06-13 | 7.8 | CVE-2024-0084 [email protected] |
nvidia–vGPU software and Cloud Gaming | NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could cause buffer overrun in the host. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service. | 2024-06-13 | 7.8 | CVE-2024-0099 [email protected] |
OpenText–ArcSight Logger | Stored Cross-Site Scripting (XSS) vulnerabilities have been identified in OpenText ArcSight Logger. The vulnerabilities could be remotely exploited. | 2024-06-11 | 8.1 | CVE-2024-4190 [email protected] |
oretnom23 — online_medicine_ordering_system | Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Arbitrary file deletion vulnerability as the backend settings have the function of deleting pictures to delete any files. | 2024-06-10 | 9.1 | CVE-2024-32167 [email protected] |
parisneo — lollms_web_ui | A Cross-Site Request Forgery (CSRF) vulnerability exists in the clear_personality_files_list function of the parisneo/lollms-webui v9.6. The vulnerability arises from the use of a GET request to clear personality files list, which lacks proper CSRF protection. This flaw allows attackers to trick users into performing actions without their consent, such as deleting important files on the system. The issue is present in the application’s handling of requests, making it susceptible to CSRF attacks that could lead to unauthorized actions being performed on behalf of the user. | 2024-06-10 | 8.1 | CVE-2024-4328 [email protected] |
popupbuilder–Popup Builder Create highly converting, mobile friendly marketing popups. | The Popup Builder – Create highly converting, mobile friendly marketing popups. plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on several functions in all versions up to, and including, 4.3.1. While some functions contain a nonce check, the nonce can be obtained from the profile page of a logged-in user. This allows subscribers to perform several actions including deleting subscribers and perform blind Server-Side Request Forgery. | 2024-06-15 | 8.1 | CVE-2023-6696 [email protected] [email protected] [email protected] |
popupbuilder–Popup Builder Create highly converting, mobile friendly marketing popups. | The Popup Builder plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on all AJAX actions. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform multiple unauthorized actions, such as deleting subscribers, and importing subscribers to conduct stored cross-site scripting attacks. | 2024-06-15 | 7.4 | CVE-2024-2544 [email protected] [email protected] |
Post SMTP–Post SMTP Mailer/Email Log | Missing Authorization vulnerability in Post SMTP Post SMTP Mailer/Email Log.This issue affects Post SMTP Mailer/Email Log: from n/a through 2.8.6. | 2024-06-11 | 8.6 | CVE-2023-52233 [email protected] |
pq-crystals — kyber | The Kyber reference implementation before 9b8d306, when compiled by LLVM Clang through 18.x with some common optimization options, has a timing side channel that allows attackers to recover an ML-KEM 512 secret key in minutes. This occurs because poly_frommsg in poly.c does not prevent Clang from emitting a vulnerable secret-dependent branch. | 2024-06-10 | 7.5 | CVE-2024-37880 [email protected] [email protected] [email protected] [email protected] [email protected] |
pr-gateway–Blog2Social: Social Media Auto Post & Scheduler | The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to SQL Injection via the ‘b2sSortPostType’ parameter in all versions up to, and including, 7.4.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | 2024-06-11 | 9.9 | CVE-2024-3549 [email protected] [email protected] |
Premio–Folders Pro | The Folders Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ‘handle_folders_file_upload’ function in all versions up to, and including, 3.0.2. This makes it possible for authenticated attackers, with author access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible. | 2024-06-14 | 8.8 | CVE-2024-2024 [email protected] [email protected] |
Red Hat–Red Hat Certificate System 10 | A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege. | 2024-06-11 | 7.5 | CVE-2023-4727 [email protected] [email protected] |
Red Hat–Red Hat Enterprise Linux 7 | A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password). | 2024-06-12 | 8.1 | CVE-2024-3183 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Red Hat–Red Hat Enterprise Linux 8 | A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the “forwardable” flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule. | 2024-06-12 | 7.1 | CVE-2024-2698 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Red Hat–Red Hat OpenShift Container Platform 4.15 | A flaw was found in cri-o. A malicious container can create a symbolic link pointing to an arbitrary directory or file on the host via directory traversal (“../”). This flaw allows the container to read and write to arbitrary files on the host system. | 2024-06-12 | 8.1 | CVE-2024-5154 [email protected] [email protected] [email protected] [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 9.8 | CVE-2024-36412 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, an unverified IFrame can be added some some inputs, which could allow for a cross-site scripting attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 9 | CVE-2024-36417 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in the `Alerts` controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 8.8 | CVE-2024-36408 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in Tree data entry point. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 8.8 | CVE-2024-36409 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax messages count controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 8.8 | CVE-2024-36410 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax displayView controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 8.8 | CVE-2024-36411 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in uploaded file verification in products allows for remote code execution. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 8.8 | CVE-2024-36415 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a deprecated v4 API example with no log rotation allows denial of service by logging excessive data. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 7.5 | CVE-2024-36416 [email protected] |
salesagility–SuiteCRM | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in connectors allows an authenticated user to perform a remote code execution attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 8.5 | CVE-2024-36418 [email protected] |
SAP_SE–SAP Financial Consolidation | SAP Financial Consolidation allows data to enter a Web application through an untrusted source. These endpoints are exposed over the network and it allows the user to modify the content from the web site. On successful exploitation, an attacker can cause significant impact to confidentiality and integrity of the application. | 2024-06-11 | 8.1 | CVE-2024-37177 [email protected] [email protected] |
SAP_SE–SAP NetWeaver AS Java | Due to unrestricted access to the Meta Model Repository services in SAP NetWeaver AS Java, attackers can perform DoS attacks on the application, which may prevent legitimate users from accessing it. This can result in no impact on confidentiality and integrity but a high impact on the availability of the application. | 2024-06-11 | 7.5 | CVE-2024-34688 [email protected] [email protected] |
Schneider Electric–Easergy Studio | CWE-428: Unquoted search path or element vulnerability exists in Easergy Studio, which could cause privilege escalation when a valid user replaces a trusted file name on the system and reboots the machine. | 2024-06-12 | 7.8 | CVE-2024-2747 [email protected] |
Schneider Electric–EcoStruxure IT Gateway | CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege escalation when logged in as a non-administrative user. | 2024-06-12 | 7.8 | CVE-2024-0865 [email protected] |
Schneider Electric–Sage 1410 | CWE-787: Out-of-bounds Write vulnerability exists that could result in an authentication bypass when sending a malformed POST request and particular configuration parameters are set. | 2024-06-12 | 9.8 | CVE-2024-37036 [email protected] |
Schneider Electric–Sage 1410 | CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability exists that could allow an authenticated user with access to the device’s web interface to corrupt files and impact device functionality when sending a crafted HTTP request. | 2024-06-12 | 8.1 | CVE-2024-37037 [email protected] |
Schneider Electric–Sage 1410 | CWE-276: Incorrect Default Permissions vulnerability exists that could allow an authenticated user with access to the device’s web interface to perform unauthorized file and firmware uploads when crafting custom web requests. | 2024-06-12 | 7.5 | CVE-2024-37038 [email protected] |
seacms — seacms | SeaCMS 12.9 has a file deletion vulnerability via admin_template.php. | 2024-06-10 | 9.1 | CVE-2024-31611 [email protected] |
securenvoy — multi-factor_authentication_solutions | Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature. | 2024-06-10 | 7.5 | CVE-2024-37393 [email protected] [email protected] [email protected] |
Siemens–PowerSys | A vulnerability has been identified in PowerSys (All versions < V3.11). The affected application insufficiently protects responses to authentication requests. This could allow a local attacker to bypass authentication, thereby gaining administrative privileges for the managed remote devices. | 2024-06-11 | 9.3 | CVE-2024-36266 [email protected] |
Siemens–SIMATIC S7-200 SMART CPU CR40 | A vulnerability has been identified in SIMATIC S7-200 SMART CPU CR40 (6ES7288-1CR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU CR60 (6ES7288-1CR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA1) (All versions). Affected devices are using a predictable IP ID sequence number. This leaves the system susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack and eventually could allow an attacker to create a denial of service condition. | 2024-06-11 | 8.2 | CVE-2024-35292 [email protected] |
Siemens–SINEC Traffic Analyzer | A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application does not expire the session. This could allow an attacker to get unauthorized access. | 2024-06-11 | 7.8 | CVE-2024-35206 [email protected] |
Siemens–SINEC Traffic Analyzer | A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery(CSRF) attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user. | 2024-06-11 | 7.8 | CVE-2024-35207 [email protected] |
Siemens–SINEC Traffic Analyzer | A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is allowing HTTP methods like PUT and Delete. This could allow an attacker to modify unauthorized files. | 2024-06-11 | 7.5 | CVE-2024-35209 [email protected] |
Siemens–SINEC Traffic Analyzer | A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application lacks input validation due to which an attacker can gain access to the Database entries. | 2024-06-11 | 7.5 | CVE-2024-35212 [email protected] |
Siemens–Tecnomatix Plant Simulation V2302 | A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0012), Tecnomatix Plant Simulation V2404 (All versions < V2404.0001). The affected applications contain a type confusion vulnerability while parsing specially crafted MODEL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22958) | 2024-06-11 | 7.8 | CVE-2024-35303 [email protected] |
Soar Cloud–HR Portal | The notification emails sent by Soar Cloud HR Portal contain a link with a embedded session. The expiration of the session is not properly configured, remaining valid for more than 7 days and can be reused. | 2024-06-14 | 8.8 | CVE-2024-5995 [email protected] [email protected] |
Soar Cloud–HR Portal | The notification emails sent by Soar Cloud HR Portal contain a link with a embedded session. These emails are sent without using an encrypted transmission protocol. If an attacker intercepts the packets, they can obtain the plaintext session information and use it to log into the system. | 2024-06-14 | 8.8 | CVE-2024-5996 [email protected] [email protected] |
SourceCodester–Employee and Visitor Gate Pass Logging System | A vulnerability, which was classified as critical, was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is the function save_users of the file /classes/Users.php?f=save. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268140. | 2024-06-12 | 7.3 | CVE-2024-5896 [email protected] [email protected] [email protected] [email protected] |
SourceCodester–Employee and Visitor Gate Pass Logging System | A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been classified as critical. Affected is the function log_employee of the file /classes/Master.php?f=log_employee. The manipulation of the argument employee_code leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268422 is the identifier assigned to this vulnerability. | 2024-06-13 | 7.3 | CVE-2024-5976 [email protected] [email protected] [email protected] [email protected] |
SourceCodester–Online Eyewear Shop | A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. This vulnerability affects unknown code of the file manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-268138 is the identifier assigned to this vulnerability. | 2024-06-12 | 7.3 | CVE-2024-5894 [email protected] [email protected] [email protected] [email protected] |
strapi–strapi | Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch. | 2024-06-12 | 7.1 | CVE-2024-34065 [email protected] |
strategery-migrations_project — strategery-migrations | Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Gabriel Somoza / Joseph Fitzgibbons Strategery Migrations allows Path Traversal, File Manipulation.This issue affects Strategery Migrations: from n/a through 1.0. | 2024-06-10 | 7.5 | CVE-2024-35745 [email protected] |
stylemixthemes — mega_menu | Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in StylemixThemes MegaMenu allows PHP Local File Inclusion.This issue affects MegaMenu: from n/a through 2.3.12. | 2024-06-10 | 9.8 | CVE-2024-35677 [email protected] |
tagDiv–tagDiv Composer | The tagDiv Composer plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8 via the ‘td_block_title’ shortcode ‘block_template_id’ attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included. | 2024-06-15 | 8.8 | CVE-2024-3813 [email protected] [email protected] |
themehigh — checkout_field_editor_for_woocommerce | Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in ThemeHigh Checkout Field Editor for WooCommerce (Pro) allows Functionality Misuse, File Manipulation.This issue affects Checkout Field Editor for WooCommerce (Pro): from n/a through 3.6.2. | 2024-06-10 | 9.1 | CVE-2024-35658 [email protected] |
themekraft — buddypress_woocommerce_my_account_integration._create_woocommerce_member_pages | Missing Authorization vulnerability in ThemeKraft WooBuddy.This issue affects WooBuddy: from n/a through 3.4.19. | 2024-06-10 | 8.8 | CVE-2024-35726 [email protected] |
Themeum–Tutor LMS | Missing Authorization vulnerability in Themeum Tutor LMS.This issue affects Tutor LMS: from n/a through 2.1.8. | 2024-06-11 | 8.3 | CVE-2023-25799 [email protected] |
tickera — tickera | Missing Authorization vulnerability in Tickera.This issue affects Tickera: from n/a through 3.5.2.6. | 2024-06-10 | 8.8 | CVE-2024-35729 [email protected] |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Toshiba printers use SNMP for configuration. Using the private community, it is possible to remotely execute commands as root on the remote printer. Using this vulnerability will allow any attacker to get a root access on a remote Toshiba printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 9.8 | CVE-2024-27143 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers provide several ways to upload files using the web interface without authentication. An attacker can overwrite any insecure files. And the Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. The programs can be replaced by malicious programs by any local or remote attacker. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 9.8 | CVE-2024-27144 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers provide several ways to upload files using the admin web interface. An attacker can remotely compromise any Toshiba printer. An attacker can overwrite any insecure files. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 9.8 | CVE-2024-27145 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Remote Command program allows an attacker to get Remote Code Execution. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 9.8 | CVE-2024-27172 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 9.8 | CVE-2024-27173 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Remote Command program allows an attacker to get Remote Code Execution. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 9.8 | CVE-2024-27174 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Toshiba printers provides API without authentication for internal access. A local attacker can bypass authentication in applications, providing administrative access. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 8.4 | CVE-2024-27169 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Attackers can bypass the web login authentication process to gain access to the printer’s system information and upload malicious drivers to the printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 8.8 | CVE-2024-3496 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Path traversal vulnerability in the web server of the Toshiba printer enables attacker to overwrite orginal files or add new ones to the printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 8.8 | CVE-2024-3497 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27147 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27148 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27149 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27150 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. The programs can be replaced by malicious programs by any local or remote attacker. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27151 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27152 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27153 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. The programs can be replaced by malicious programs by any local or remote attacker. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.7 | CVE-2024-27155 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | All the Toshiba printers share the same hardcoded root password. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27158 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Toshiba printers contain hardcoded credentials. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.1 | CVE-2024-27164 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Toshiba printers contain a suidperl binary and it has a Local Privilege Escalation vulnerability. A local attacker can get root privileges. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.8 | CVE-2024-27165 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Coredump binaries in Toshiba printers have incorrect permissions. A local attacker can steal confidential information. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27166 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Toshiba printers use Sendmail to send emails to recipients. Sendmail is used with several insecure directories. A local attacker can inject a malicious Sendmail configuration file. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27167 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | It appears that some hardcoded keys are used for authentication to internal API. Knowing these private keys may allow attackers to bypass authentication and reach administrative interfaces. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.1 | CVE-2024-27168 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | It was observed that all the Toshiba printers contain credentials used for WebDAV access in the readable file. Then, it is possible to get a full access with WebDAV to the printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27170 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | A remote attacker using the insecure upload functionality will be able to overwrite any Python file and get Remote Code Execution. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.4 | CVE-2024-27171 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | An attacker can get Remote Code Execution by overwriting files. Overwriting files is enable by falsifying session ID variable. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.2 | CVE-2024-27176 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | An attacker can get Remote Code Execution by overwriting files. Overwriting files is enable by falsifying package name variable. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.2 | CVE-2024-27177 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | An attacker can get Remote Code Execution by overwriting files. Overwriting files is enable by falsifying file name variable. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.2 | CVE-2024-27178 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Attackers can then execute malicious files by enabling certain services of the printer via the web configuration page and elevate its privileges to root. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 7.8 | CVE-2024-3498 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Trellix–Intrusion Prevention System (IPS) Manager | Insecure Deserialization in some workflows of the IPS Manager allows unauthenticated remote attackers to perform arbitrary code execution and access to the vulnerable Trellix IPS Manager. | 2024-06-14 | 9.8 | CVE-2024-5671 [email protected] |
Trend Micro, Inc.–Trend Micro Apex One | An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2024-36303. | 2024-06-10 | 7.8 | CVE-2024-36302 [email protected] [email protected] |
Trend Micro, Inc.–Trend Micro Apex One | An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2024-36302. | 2024-06-10 | 7.8 | CVE-2024-36303 [email protected] [email protected] |
Trend Micro, Inc.–Trend Micro Apex One | A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | 2024-06-10 | 7.8 | CVE-2024-36304 [email protected] [email protected] |
Trend Micro, Inc.–Trend Micro Apex One | A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | 2024-06-10 | 7.8 | CVE-2024-36305 [email protected] [email protected] |
Trend Micro, Inc.–Trend Micro Apex One | An improper access control vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | 2024-06-10 | 7.8 | CVE-2024-37289 [email protected] [email protected] |
Trend Micro, Inc.–Trend Micro Deep Security Agent | A link following vulnerability in Trend Micro Deep Security 20.x agents below build 20.0.1-3180 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | 2024-06-10 | 7.8 | CVE-2024-36358 [email protected] [email protected] |
Trend Micro, Inc.–Trend Micro Maximum Security (Consumer) | Trend Micro Security 17.x (Consumer) is vulnerable to a Privilege Escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. | 2024-06-10 | 7.8 | CVE-2024-32849 [email protected] [email protected] |
tribe29 — checkmk | Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms. | 2024-06-10 | 7.5 | CVE-2024-28833 [email protected] |
Verint–WFO | Verint – CWE-434: Unrestricted Upload of File with Dangerous Type | 2024-06-13 | 8.8 | CVE-2024-36396 [email protected] |
webcraftic–Woody code snippets Insert Header Footer Code, AdSense Ads | The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.5.0 via the ‘insert_php’ shortcode. This is due to the plugin not restricting the usage of the functionality to high level authorized users. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server. | 2024-06-15 | 9.9 | CVE-2024-3105 [email protected] [email protected] [email protected] [email protected] |
wedevs–Dokan Pro | The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the ‘code’ parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | 2024-06-13 | 10 | CVE-2024-3922 [email protected] [email protected] |
WPENGINE INC–Advanced Custom Fields PRO | Vulnerability discovered by executing a planned security audit. Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in WPENGINE INC Advanced Custom Fields PRO allows PHP Local File Inclusion.This issue affects Advanced Custom Fields PRO: from n/a before 6.2.10. | 2024-06-10 | 9.9 | CVE-2024-34762 [email protected] |
WPENGINE INC–Advanced Custom Fields PRO | Vulnerability discovered by executing a planned security audit. Improper Control of Generation of Code (‘Code Injection’) vulnerability in WPENGINE INC Advanced Custom Fields PRO allows Code Injection.This issue affects Advanced Custom Fields PRO: from n/a before 6.2.10. | 2024-06-10 | 8.5 | CVE-2024-34761 [email protected] |
wpmet–ElementsKit Pro | The ElementsKit PRO plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 3.6.2 via the ‘render_raw’ function. This can allow authenticated attackers, with contributor-level permissions and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | 2024-06-14 | 8.5 | CVE-2024-4404 [email protected] [email protected] |
WPStaging–WP STAGING Pro WordPress Backup Plugin | The WP STAGING Pro WordPress Backup Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.6.0. This is due to missing or incorrect nonce validation on the ‘sub’ parameter called from the WP STAGING WordPress Backup Plugin – Backup Duplicator & Migration plugin. This makes it possible for unauthenticated attackers to include any local files that end in ‘-settings.php’ via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2024-06-14 | 7.5 | CVE-2024-5551 [email protected] [email protected] [email protected] |
WPWeb–WooCommerce – Social Login | The WooCommerce – Social Login plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.2 via deserialization of untrusted input from the ‘woo_slg_verify’ vulnerable parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | 2024-06-15 | 9.8 | CVE-2024-5871 [email protected] [email protected] |
yotuwp–Video Gallery YouTube Playlist, Channel Gallery by YotuWP | The Video Gallery – YouTube Playlist, Channel Gallery by YotuWP plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.13 via the settings parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | 2024-06-15 | 9.8 | CVE-2024-4258 [email protected] [email protected] |
Medium Vulnerabilities
Primary Vendor — Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
3uu–Shariff Wrapper | The Shariff Wrapper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘shariff’ shortcode in all versions up to, and including, 4.6.13 due to insufficient input sanitization and output escaping on user supplied attributes such as ‘borderradius’ and ‘timestamp’. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-15 | 6.4 | CVE-2024-2695 [email protected] [email protected] |
A WP Life–Album Gallery WordPress Gallery | Missing Authorization vulnerability in A WP Life Album Gallery – WordPress Gallery.This issue affects Album Gallery – WordPress Gallery: from n/a through 1.5.7. | 2024-06-10 | 4.3 | CVE-2024-35720 [email protected] |
A WP Life–Media Slider Photo Sleder, Video Slider, Link Slider, Carousal Slideshow | Missing Authorization vulnerability in A WP Life Media Slider – Photo Sleder, Video Slider, Link Slider, Carousal Slideshow.This issue affects Media Slider – Photo Sleder, Video Slider, Link Slider, Carousal Slideshow: from n/a through 1.3.9. | 2024-06-10 | 4.3 | CVE-2024-35717 [email protected] |
acurax — under_construction_\/_maintenance_mode | Authentication Bypass by Spoofing vulnerability in Acurax Under Construction / Maintenance Mode from Acurax allows Authentication Bypass.This issue affects Under Construction / Maintenance Mode from Acurax: from n/a through 2.6. | 2024-06-10 | 5.3 | CVE-2024-35749 [email protected] |
AddonMaster–Load More Anything | Missing Authorization vulnerability in AddonMaster Load More Anything.This issue affects Load More Anything: from n/a through 3.3.3. | 2024-06-11 | 5.4 | CVE-2024-24704 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-20769 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-20784 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26036 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a malicious form. | 2024-06-13 | 5.4 | CVE-2024-26037 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the vulnerability. | 2024-06-13 | 5.4 | CVE-2024-26039 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the vulnerability. | 2024-06-13 | 5.4 | CVE-2024-26053 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26054 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the malicious script. | 2024-06-13 | 5.4 | CVE-2024-26055 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a form that triggers the malicious script. | 2024-06-13 | 5.4 | CVE-2024-26057 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link. | 2024-06-13 | 5.4 | CVE-2024-26058 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26060 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26066 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26068 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26070 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26071 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that causes the vulnerable script to execute. | 2024-06-13 | 5.4 | CVE-2024-26072 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26074 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26075 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26077 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26078 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26081 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26082 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26083 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26085 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26088 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26092 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-26093 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26095 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26110 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-26111 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-26113 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-26114 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-26115 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-26116 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26121 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-26123 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-34119 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-34120 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36141 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36142 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36143 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36144 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36146 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36147 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36148 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36149 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36150 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36152 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36153 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36154 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36155 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36156 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36158 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36159 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36160 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36161 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36162 [email protected] |
adobe — experience_manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 4.8 | CVE-2024-26049 [email protected] |
Adobe–Acrobat Mobile Sign Android | Acrobat Mobile Sign Android versions 24.4.2.33155 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to access files and directories that are outside the restricted directory and also to overwrite arbitrary files. Exploitation of this issue does not requires user interaction and attack complexity is high. | 2024-06-13 | 6.3 | CVE-2024-34129 [email protected] |
Adobe–Acrobat Mobile Sign Android | Acrobat Mobile Sign Android versions 24.4.2.33155 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could exploit this vulnerability to access confidential information. Exploitation of this issue does not require user interaction. | 2024-06-13 | 5.5 | CVE-2024-34130 [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted request to the server, which could then cause the server to execute arbitrary code. Exploitation of this issue does not require user interaction. | 2024-06-13 | 6.5 | CVE-2024-34111 [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to gain unauthorized access or perform actions with the privileges of another user. Exploitation of this issue does not require user interaction. | 2024-06-13 | 5.3 | CVE-2024-34106 [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. | 2024-06-13 | 5.3 | CVE-2024-34107 [email protected] |
Adobe–Adobe Commerce | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an admin attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 4.8 | CVE-2024-34105 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-26086 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, as the victim needs to visit a web page with a maliciously crafted script. | 2024-06-13 | 5.4 | CVE-2024-26089 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link. | 2024-06-13 | 5.4 | CVE-2024-26090 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that causes the vulnerable script to execute. | 2024-06-13 | 5.4 | CVE-2024-26091 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-26117 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, as the victim needs to visit a web page with a maliciously crafted script. | 2024-06-13 | 5.4 | CVE-2024-36151 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36157 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36163 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36164 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36165 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36166 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36167 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36168 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36169 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36170 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36171 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36172 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36173 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36174 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36175 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36176 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36177 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36178 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36179 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36180 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, typically in the form of convincing a victim to visit a maliciously crafted web page or to interact with a maliciously modified DOM element within the application. | 2024-06-13 | 5.4 | CVE-2024-36181 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36182 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a malicious form. | 2024-06-13 | 5.4 | CVE-2024-36183 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a malicious link or to submit a specially crafted form. | 2024-06-13 | 5.4 | CVE-2024-36184 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36185 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36186 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36187 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36188 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36189 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a form that triggers the vulnerability. | 2024-06-13 | 5.4 | CVE-2024-36190 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36191 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36192 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36193 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36194 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36195 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36196 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the vulnerability. | 2024-06-13 | 5.4 | CVE-2024-36197 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36198 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36199 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36200 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36201 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36202 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36203 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36204 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36205 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-36206 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36207 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36208 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36209 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-36210 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-36211 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36212 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36213 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36214 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36215 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2024-06-13 | 5.4 | CVE-2024-36216 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36217 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36218 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36219 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the malicious script. | 2024-06-13 | 5.4 | CVE-2024-36220 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36221 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the vulnerability. | 2024-06-13 | 5.4 | CVE-2024-36222 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a form that causes the vulnerable script to execute. | 2024-06-13 | 5.4 | CVE-2024-36224 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36225 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a malicious form. | 2024-06-13 | 5.4 | CVE-2024-36227 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the vulnerability. | 2024-06-13 | 5.4 | CVE-2024-36228 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a malicious form. | 2024-06-13 | 5.4 | CVE-2024-36229 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a form that causes the execution of the malicious script. | 2024-06-13 | 5.4 | CVE-2024-36230 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a form that causes the execution of the malicious script. | 2024-06-13 | 5.4 | CVE-2024-36231 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2024-06-13 | 5.4 | CVE-2024-36232 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a victim to click on a malicious link. | 2024-06-13 | 5.4 | CVE-2024-36233 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a form that triggers the vulnerability. | 2024-06-13 | 5.4 | CVE-2024-36234 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a form that causes the execution of the malicious script. | 2024-06-13 | 5.4 | CVE-2024-36235 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link. | 2024-06-13 | 5.4 | CVE-2024-36236 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a malicious link or to interact with a maliciously crafted web page. | 2024-06-13 | 5.4 | CVE-2024-36238 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim’s browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link. | 2024-06-13 | 5.4 | CVE-2024-36239 [email protected] |
Adobe–Audition | Audition versions 24.2, 23.6.4 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2024-06-13 | 5.5 | CVE-2024-30276 [email protected] |
Adobe–Audition | Audition versions 24.2, 23.6.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service condition. An attacker could exploit this vulnerability to crash the application, leading to a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2024-06-13 | 5.5 | CVE-2024-30285 [email protected] |
Adobe–ColdFusion | ColdFusion versions 2023u7, 2021u13 and earlier are affected by a Weak Cryptography for Passwords vulnerability that could result in a security feature bypass. This vulnerability arises due to the use of insufficiently strong cryptographic algorithms or flawed implementation that compromises the confidentiality of password data. An attacker could exploit this weakness to decrypt or guess passwords, potentially gaining unauthorized access to protected resources. Exploitation of this issue does not require user interaction. | 2024-06-13 | 6.2 | CVE-2024-34113 [email protected] |
Adobe–Creative Cloud Desktop | Creative Cloud Desktop versions 6.1.0.587 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to load and execute malicious libraries, leading to arbitrary file delete. Exploitation of this issue requires user interaction. | 2024-06-13 | 5.5 | CVE-2024-34116 [email protected] |
Adobe–Media Encoder | Media Encoder versions 23.6.5, 24.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2024-06-13 | 5.5 | CVE-2024-30278 [email protected] |
Afzal Multani–WP Clone Menu | Missing Authorization vulnerability in Afzal Multani WP Clone Menu.This issue affects WP Clone Menu: from n/a through 1.0.1. | 2024-06-12 | 5.4 | CVE-2023-38395 [email protected] |
aimeos–ai-client-html | The Aimeos HTML client provides Aimeos HTML components for e-commerce projects. Starting in version 2020.04.1 and prior to versions 2020.10.27, 2021.10.21, 2022.10.12, 2023.10.14, and 2024.04.5, digital downloads sold in online shops can be downloaded without valid payment, e.g. if the payment didn’t succeed. Versions 2020.10.27, 2021.10.21, 2022.10.12, 2023.10.14, and 2024.04.5 fix this issue. | 2024-06-11 | 5.3 | CVE-2024-37296 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
aimeos–aimeos-core | Aimeos is an Open Source e-commerce framework for online shops. All SaaS and marketplace setups using Aimeos version from 2022/2023/2024 are affected by a potential denial of service attack. Users should upgrade to versions 2022.10.17, 2023.10.17, or 2024.04 of the aimeos/aimeos-core package to receive a patch. | 2024-06-11 | 5.5 | CVE-2024-37294 [email protected] |
Anders Norn–Radcliffe 2 | Missing Authorization vulnerability in Anders Norén Radcliffe 2.This issue affects Radcliffe 2: from n/a through 2.0.17. | 2024-06-11 | 5.3 | CVE-2024-35685 [email protected] |
apple — macos | An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.5. A website may be able to track the websites a user visited in Safari private browsing mode. | 2024-06-10 | 5.3 | CVE-2022-32933 [email protected] |
apple — macos | The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to access sensitive user data. | 2024-06-10 | 5.5 | CVE-2023-40389 [email protected] [email protected] |
apple — macos | This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data. | 2024-06-10 | 5.5 | CVE-2024-27792 [email protected] |
Aspose.cloud Marketplace–Aspose.Words Exporter | Missing Authorization vulnerability in Aspose.Cloud Marketplace Aspose.Words Exporter.This issue affects Aspose.Words Exporter: from n/a through 6.3.1. | 2024-06-11 | 4.3 | CVE-2024-32146 [email protected] |
ASUS–Download Master | The parameter used in the certain page of ASUS Download Master is not properly filtered for user input. A remote attacker with administrative privilege can insert JavaScript code to the parameter for Reflected Cross-site scripting attacks. | 2024-06-14 | 4.8 | CVE-2024-31159 [email protected] [email protected] |
ASUS–Download Master | The parameter used in the certain page of ASUS Download Master is not properly filtered for user input. A remote attacker with administrative privilege can insert JavaScript code to the parameter for Stored Cross-site scripting attacks. | 2024-06-14 | 4.8 | CVE-2024-31160 [email protected] [email protected] |
Awesome Support Team–Awesome Support | Missing Authorization vulnerability in Awesome Support Team Awesome Support.This issue affects Awesome Support: from n/a through 6.1.5. | 2024-06-12 | 5.3 | CVE-2023-51537 [email protected] |
baden03–Collapse-O-Matic | The Collapse-O-Matic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘expand’ and ‘expandsub’ shortcode in all versions up to, and including, 1.8.5.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-15 | 6.4 | CVE-2024-4095 [email protected] [email protected] [email protected] [email protected] [email protected] |
badhonrocks–Divi Torque Lite Divi Theme and Extra Theme | The Divi Torque Lite – Divi Theme and Extra Theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘support_unfiltered_files_upload’ function in all versions up to, and including, 3.6.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-12 | 6.4 | CVE-2024-5892 [email protected] [email protected] [email protected] |
Bastianon Massimo–WP GPX Map | Missing Authorization vulnerability in Bastianon Massimo WP GPX Map.This issue affects WP GPX Map: from n/a through 1.7.08. | 2024-06-12 | 4.3 | CVE-2023-44234 [email protected] |
BBS e-Theme–BBS e-Popup | Missing Authorization vulnerability in BBS e-Theme BBS e-Popup.This issue affects BBS e-Popup: from n/a through 2.4.5. | 2024-06-14 | 6.5 | CVE-2023-36504 [email protected] |
bdthemes–Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) | The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s Creative Button widget in all versions up to, and including, 5.6.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-12 | 6.4 | CVE-2024-3925 [email protected] [email protected] |
BeyondTrust–BeyondInsight PasswordSafe | A medium severity vulnerability in BIPS has been identified where an authenticated attacker with high privileges can access the SSH private keys via an information leak in the server response. | 2024-06-11 | 5.9 | CVE-2024-5813 13061848-ea10-403d-bd75-c83a022c2891 |
bradvin–FooGallery Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel | The Best WordPress Gallery Plugin – FooGallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via album gallery custom URLs in all versions up to, and including, 2.4.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-14 | 6.4 | CVE-2024-2122 [email protected] [email protected] |
Brainstorm Force–ProjectHuddle Client Site | Missing Authorization vulnerability in Brainstorm Force ProjectHuddle Client Site.This issue affects ProjectHuddle Client Site: from n/a through 1.0.34. | 2024-06-14 | 4.3 | CVE-2023-51376 [email protected] |
brainstormforce–Elementor Header & Footer Builder | The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the url attribute within the plugin’s Site Title widget in all versions up to, and including, 1.6.35 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-13 | 6.4 | CVE-2024-5757 [email protected] [email protected] [email protected] [email protected] |
Brett Shumaker–Simple Staff List | Missing Authorization vulnerability in Brett Shumaker Simple Staff List.This issue affects Simple Staff List: from n/a through 2.2.4. | 2024-06-12 | 4.3 | CVE-2023-51526 [email protected] |
britner–Gutenberg Blocks with AI by Kadence WP Page Builder Features | The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘titleFont’ parameter in all versions up to, and including, 3.2.38 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-14 | 6.4 | CVE-2024-4863 [email protected] [email protected] [email protected] |
Bryan Lee–Kingkong Board | Missing Authorization vulnerability in Bryan Lee Kingkong Board.This issue affects Kingkong Board: from n/a through 2.1.0.2. | 2024-06-14 | 6.3 | CVE-2023-36694 [email protected] |
buddypress–BuddyPress | The BuddyPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘display_name’ parameter in versions up to, and including, 12.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-12 | 6.4 | CVE-2024-4892 [email protected] [email protected] [email protected] |
BulkGate–BulkGate SMS Plugin for WooCommerce | Missing Authorization vulnerability in BulkGate BulkGate SMS Plugin for WooCommerce.This issue affects BulkGate SMS Plugin for WooCommerce: from n/a through 3.0.2. | 2024-06-12 | 5.4 | CVE-2023-51679 [email protected] |
Business Directory Team–Business Directory Plugin | Missing Authorization vulnerability in Business Directory Team Business Directory Plugin.This issue affects Business Directory Plugin: from n/a through 6.3.9. | 2024-06-14 | 5.4 | CVE-2023-51516 [email protected] |
Buy Me a Coffee–Buy Me a Coffee | Missing Authorization vulnerability in Buy Me a Coffee.This issue affects Buy Me a Coffee: from n/a through 3.7. | 2024-06-12 | 4.3 | CVE-2023-25030 [email protected] |
Code for Recovery–12 Step Meeting List | Missing Authorization vulnerability in Code for Recovery 12 Step Meeting List.This issue affects 12 Step Meeting List: from n/a through 3.14.28. | 2024-06-10 | 4.3 | CVE-2024-22296 [email protected] |
Codection–Import and export users and customers | Missing Authorization vulnerability in Codection Import and export users and customers.This issue affects Import and export users and customers: from n/a through 1.26.5. | 2024-06-11 | 5.4 | CVE-2024-34815 [email protected] |
codename065–Download Manager | The Download Manager Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via wpdm_user_dashboard, wpdm_package, wpdm_packages, wpdm_search_result, and wpdm_tag shortcodes in all versions up to, and including, 3.2.92 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-12 | 6.4 | CVE-2024-5266 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
codename065–Download Manager | The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a user’s Display Name in all versions up to, and including, 3.2.86 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires social engineering to successfully exploit, and the impact would be very limited due to the attacker requiring a user to login as the user with the injected payload for execution. | 2024-06-12 | 4.4 | CVE-2024-1766 [email protected] [email protected] |
codexpert–CoDesigner The Most Compact and User-Friendly Elementor WooCommerce Builder | The CoDesigner WooCommerce Builder for Elementor – Customize Checkout, Shop, Email, Products & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s Shop Slider, Tabs Classic, and Image Comparison widgets in all versions up to, and including, 4.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-12 | 6.4 | CVE-2024-4564 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Comtrend–Comtrend WLD71-T1_v2.0.201820 | Cross-Site Request Forgery vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability allows an attacker to force an end user to execute unwanted actions in a web application to which he is authenticated. | 2024-06-10 | 6.5 | CVE-2024-5786 [email protected] |
Contact List PRO–Contact List Easy Business Directory, Staff Directory and Address Book Plugin | Missing Authorization vulnerability in Contact List PRO Contact List – Easy Business Directory, Staff Directory and Address Book Plugin.This issue affects Contact List – Easy Business Directory, Staff Directory and Address Book Plugin: from n/a through 2.9.87. | 2024-06-11 | 5.3 | CVE-2024-34821 [email protected] |
contact_form_builder_project — contact_form_builder | Improper Restriction of Excessive Authentication Attempts vulnerability in wpdevart Contact Form Builder, Contact Widget allows Functionality Bypass.This issue affects Contact Form Builder, Contact Widget: from n/a through 2.1.7. | 2024-06-10 | 5.3 | CVE-2024-35747 [email protected] |
Copymatic–Copymatic AI Content Writer & Generator | Missing Authorization vulnerability in Copymatic Copymatic – AI Content Writer & Generator.This issue affects Copymatic – AI Content Writer & Generator: from n/a through 1.9. | 2024-06-11 | 6.5 | CVE-2024-35716 [email protected] |
crate–crate | CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue. | 2024-06-13 | 5.3 | CVE-2024-37309 [email protected] [email protected] [email protected] |
Deepak anand–WP Dummy Content Generator | Missing Authorization vulnerability in Deepak anand WP Dummy Content Generator.This issue affects WP Dummy Content Generator: from n/a through 2.3.0. | 2024-06-14 | 5.3 | CVE-2023-37394 [email protected] |
Dell–CPG BIOS | Dell Client Platform contains an incorrect authorization vulnerability. An attacker with physical access to the system could potentially exploit this vulnerability by bypassing BIOS authorization to modify settings in the BIOS. | 2024-06-12 | 6.8 | CVE-2024-0160 [email protected] |
Dell–CPG BIOS | Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. | 2024-06-13 | 5.1 | CVE-2024-32856 [email protected] |
Dell–CPG BIOS | Dell Client BIOS contains an Out-of-bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to platform denial of service. | 2024-06-12 | 4.7 | CVE-2024-28970 [email protected] |
Dell–Secure Connect Gateway-Application | Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal enable REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain Internal APIs applicable only for Admin Users on the application’s backend database that could potentially allow an unauthorized user access to restricted resources and change of state. | 2024-06-13 | 5.4 | CVE-2024-28965 [email protected] |
Dell–Secure Connect Gateway-Application | Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal update REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain APIs applicable only for Admin Users on the application’s backend database that could potentially allow an unauthorized user access to restricted resources and change of state. | 2024-06-13 | 5.4 | CVE-2024-28966 [email protected] |
Dell–Secure Connect Gateway-Application | Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal maintenance REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain APIs applicable only for Admin Users on the application’s backend database that could potentially allow an unauthorized user access to restricted resources and change of state. | 2024-06-13 | 5.4 | CVE-2024-28967 [email protected] |
Dell–Secure Connect Gateway-Application | Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for internal email and collection settings REST APIs (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain APIs applicable only for Admin Users on the application’s backend database that could potentially allow an unauthorized user access to restricted resources and change of state. | 2024-06-13 | 5.4 | CVE-2024-28968 [email protected] |
Dell–Secure Connect Gateway-Application | Dell SCG, versions prior to 5.22.00.00, contain a SQL Injection Vulnerability in the SCG UI for an internal assets REST API. A remote authenticated attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application’s backend database causing potential unauthorized access and modification of application data. | 2024-06-13 | 5.4 | CVE-2024-29168 [email protected] |
Dell–Secure Connect Gateway-Application | Dell SCG, versions prior to 5.22.00.00, contain a SQL Injection Vulnerability in the SCG UI for an internal audit REST API. A remote authenticated attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application’s backend database causing potential unauthorized access and modification of application data. | 2024-06-13 | 5.4 | CVE-2024-29169 [email protected] |
Dell–Secure Connect Gateway-Application | Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal update REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain APIs applicable only for Admin Users on the application’s backend database that could potentially allow an unauthorized user access to restricted resources. | 2024-06-13 | 4.3 | CVE-2024-28969 [email protected] |
devitemsllc–ShopLentor WooCommerce Builder for Elementor & Gutenberg +12 Modules All in One Solution (formerly WooLentor) | The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s WL: Product Horizontal Filter widget in all versions up to, and including, 2.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-11 | 6.4 | CVE-2024-5530 [email protected] [email protected] [email protected] |
dgwyer–Simple Sitemap Create a Responsive HTML Sitemap | The Simple Sitemap – Create a Responsive HTML Sitemap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.5.13. This is due to missing or incorrect nonce validation in the ‘admin_notices’ hook found in class-settings.php. This makes it possible for unauthenticated attackers to reset the plugin options to a default state via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2024-06-14 | 4.3 | CVE-2023-6492 [email protected] [email protected] |
Discourse–WP Discourse | Missing Authorization vulnerability in Discourse WP Discourse.This issue affects WP Discourse: from n/a through 2.5.1. | 2024-06-11 | 4.3 | CVE-2024-35168 [email protected] |
Elastic–Elasticsearch | It was identified that if a cross-cluster API key https://www.elastic.co/guide/en/elasticsearch/reference/8.14/security-api-create-cross-cluster-api-key.html#security-api-create-cross-cluster-api-key-request-body  restricts search for a given index using the query or the field_security parameter, and the same cross-cluster API key also grants replication for the same index, the search restrictions are not enforced during cross cluster search operations and search results may include documents and terms that should not be returned. This issue only affects the API key based security model for remote clusters https://www.elastic.co/guide/en/elasticsearch/reference/8.14/remote-clusters.html#remote-clusters-security-models  that was previously a beta feature and is released as GA with 8.14.0 | 2024-06-12 | 6.5 | CVE-2024-23445 [email protected] |
Elastic–Elasticsearch | A flaw was discovered in Elasticsearch, affecting document ingestion when an index template contains a dynamic field mapping of “passthrough” type. Under certain circumstances, ingesting documents in this index would cause a StackOverflow exception to be thrown and ultimately lead to a Denial of Service. Note that passthrough fields is an experimental feature. | 2024-06-13 | 4.9 | CVE-2024-37280 [email protected] |
Elastic–Kibana | An open redirect issue was discovered in Kibana that could lead to a user being redirected to an arbitrary website if they use a maliciously crafted Kibana URL. | 2024-06-14 | 6.1 | CVE-2024-23442 [email protected] |
Elastic–Kibana | A flaw was discovered in Kibana, allowing view-only users of alerting to use the run_soon API making the alerting rule run continuously, potentially affecting the system availability if the alerting rule is running complex queries. | 2024-06-13 | 4.3 | CVE-2024-37279 [email protected] |
Elementor–Elementor Website Builder | Missing Authorization vulnerability in Elementor Elementor Website Builder.This issue affects Elementor Website Builder: from n/a through 3.13.2. | 2024-06-11 | 4.3 | CVE-2023-33922 [email protected] |
elespare–Elespare News, Magazine and Blog Elements & Blog Addons for Elementor with Header Footer Builder. One Click Import: No Coding Required! | The Elespare – Blog, Magazine and Newspaper Addons for Elementor with Templates, Widgets, Kits, and Header/Footer Builder. One Click Import: No Coding Required! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Horizontal Nav Menu’ widget in all versions up to, and including, 3.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-13 | 6.4 | CVE-2024-4615 [email protected] [email protected] |
emlog — emlog | Emlog pro2.3 is vulnerable to Cross Site Request Forgery (CSRF) via twitter.php which can be used with a XSS vulnerability to access administrator information. | 2024-06-10 | 6.5 | CVE-2024-31612 [email protected] |
ExpressTech–Quiz And Survey Master | Missing Authorization vulnerability in ExpressTech Quiz And Survey Master.This issue affects Quiz And Survey Master: from n/a through 8.1.16. | 2024-06-14 | 5.3 | CVE-2023-51507 [email protected] |
Fastly–Fastly | Missing Authorization vulnerability in Fastly.This issue affects Fastly: from n/a through 1.2.25. | 2024-06-11 | 5.3 | CVE-2024-34768 [email protected] |
Fat Rat–Fat Rat Collect | Missing Authorization vulnerability in Fat Rat Fat Rat Collect.This issue affects Fat Rat Collect: from n/a through 2.6.7. | 2024-06-14 | 4.3 | CVE-2023-35045 [email protected] |
Fortinet–FortiOS | A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.12 and 6.4.6 through 6.4.15 and 6.2.9 through 6.2.16 and 6.0.13 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted CLI commands. | 2024-06-11 | 6.7 | CVE-2023-46720 [email protected] |
Fortinet–FortiOS | A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file. | 2024-06-11 | 6.8 | CVE-2024-23111 [email protected] |
Fortinet–FortiPortal | A improper neutralization of special elements used in an sql command (‘sql injection’) in Fortinet FortiPortal versions 7.0.0 through 7.0.6 and version 7.2.0 allows privileged user to obtain unauthorized information via the report download functionality. | 2024-06-11 | 4.3 | CVE-2024-31495 [email protected] |
Fortinet–FortiSOAR | Multiple improper neutralization of special elements used in SQL commands (‘SQL Injection’) vulnerabilities [CWE-89] in FortiSOAR 7.2.0 and before 7.0.3 may allow an authenticated attacker to execute unauthorized code or commands via specifically crafted strings parameters. | 2024-06-11 | 6.5 | CVE-2023-23775 [email protected] |
FunnelKit–FunnelKit Checkout | Missing Authorization vulnerability in FunnelKit FunnelKit Checkout.This issue affects FunnelKit Checkout: from n/a through 3.10.3. | 2024-06-12 | 5.4 | CVE-2023-51671 [email protected] |
FunnelKit–FunnelKit Checkout | Missing Authorization vulnerability in FunnelKit FunnelKit Checkout.This issue affects FunnelKit Checkout: from n/a through 3.10.3. | 2024-06-12 | 4.3 | CVE-2023-51670 [email protected] |
futuriowp–Futurio Extra | The Futurio Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘header_size’ attribute within the Advanced Text Block widget in all versions up to, and including, 2.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-11 | 6.4 | CVE-2024-5646 [email protected] [email protected] [email protected] |
galdub–Folders Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager | The Folders and Folders Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.0 in Folders and 3.0.2 in Folders Pro via the ‘handle_folders_file_upload’ function. This makes it possible for authenticated attackers, with author access and above, to upload files to arbitrary locations on the server. | 2024-06-14 | 4.3 | CVE-2024-2023 [email protected] [email protected] [email protected] |
Gangesh Matta–Simple Org Chart | Missing Authorization vulnerability in Gangesh Matta Simple Org Chart.This issue affects Simple Org Chart: from n/a through 2.3.4. | 2024-06-12 | 5.3 | CVE-2023-40603 [email protected] |
GitLab–GitLab | An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.1 prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. It was possible for an attacker to cause a denial of service using maliciously crafted file. | 2024-06-12 | 6.5 | CVE-2024-1495 [email protected] [email protected] [email protected] |
GitLab–GitLab | An issue has been discovered in GitLab CE/EE affecting all versions prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. A vulnerability in GitLab’s CI/CD pipeline editor could allow for denial of service attacks through maliciously crafted configuration files. | 2024-06-12 | 6.5 | CVE-2024-1736 [email protected] [email protected] [email protected] |
GitLab–GitLab | An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.4 prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. A vulnerability in GitLab’s Asana integration allowed an attacker to potentially cause a regular expression denial of service by sending specially crafted requests. | 2024-06-12 | 6.5 | CVE-2024-1963 [email protected] [email protected] [email protected] |
GitLab–GitLab | A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 16.10.7, all versions starting from 16.11 before 16.111.4, all versions starting from 17.0 before 17.0.2. When viewing an XML file in a repository in raw mode, it can be made to render as HTML if viewed under specific circumstances. | 2024-06-12 | 4.4 | CVE-2024-4201 [email protected] [email protected] [email protected] |
gloriafood–Restaurant Menu Food Ordering System Table Reservation | The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s shortcode(s) in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-15 | 6.4 | CVE-2024-1399 [email protected] [email protected] |
gpriday–SiteOrigin Widgets Bundle | The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s SiteOrigin Blog Widget in all versions up to, and including, 1.61.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-11 | 6.4 | CVE-2024-5090 [email protected] [email protected] |
grpc–grpc-node | @grpc/grps-js implements the core functionality of gRPC purely in JavaScript, without a C++ addon. Prior to versions 1.10.9, 1.9.15, and 1.8.22, there are two separate code paths in which memory can be allocated per message in excess of the `grpc.max_receive_message_length` channel option: If an incoming message has a size on the wire greater than the configured limit, the entire message is buffered before it is discarded; and/or if an incoming message has a size within the limit on the wire but decompresses to a size greater than the limit, the entire message is decompressed into memory, and on the server is not discarded. This has been patched in versions 1.10.9, 1.9.15, and 1.8.22. | 2024-06-10 | 5.3 | CVE-2024-37168 [email protected] [email protected] [email protected] [email protected] |
HahnCreativeGroup–WP Translate | Missing Authorization vulnerability in HahnCreativeGroup WP Translate.This issue affects WP Translate: from n/a through 5.3.0. | 2024-06-11 | 5.4 | CVE-2024-35663 [email protected] |
Happyforms–Happyforms | Missing Authorization vulnerability in Happyforms.This issue affects Happyforms: from n/a through 1.25.10. | 2024-06-11 | 5.3 | CVE-2024-23521 [email protected] |
Harbor–Harbor | Open Redirect in Harbor <=v2.8.4, <=v2.9.2, and <=v2.10.0 may redirect a user to a malicious site. | 2024-06-10 | 4.3 | CVE-2024-22244 [email protected] |
Hardik Chavada–Sticky Social Media Icons | Missing Authorization vulnerability in Hardik Chavada Sticky Social Media Icons.This issue affects Sticky Social Media Icons: from n/a through 2.1. | 2024-06-12 | 5.4 | CVE-2023-40672 [email protected] |
Himalaya Saxena–Highcompress Image Compressor | Missing Authorization vulnerability in Himalaya Saxena Highcompress Image Compressor.This issue affects Highcompress Image Compressor: from n/a through 6.0.0. | 2024-06-12 | 6.5 | CVE-2023-40209 [email protected] |
hiroaki-miyashita–Custom Field Template | The Custom Field Template plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘cpt’ shortcode in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied post meta. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-11 | 6.4 | CVE-2023-6745 [email protected] [email protected] |
hiroaki-miyashita–Custom Field Template | The Custom Field Template plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s custom field name column in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied custom fields. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-11 | 6.4 | CVE-2024-0627 [email protected] [email protected] |
hiroaki-miyashita–Custom Field Template | The Custom Field Template plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.1 via the ‘cft’ shortcode. This makes it possible for authenticated attackers with contributor access and above, to extract sensitive data including arbitrary post metadata. | 2024-06-11 | 4.3 | CVE-2023-6748 [email protected] [email protected] |
hiroaki-miyashita–Custom Field Template | The Custom Field Template plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | 2024-06-11 | 4.4 | CVE-2024-0653 [email protected] [email protected] |
Hitachi Energy–FOXMAN-UN | A vulnerability exists in the FOXMAN-UN/UNEM server / APIGateway that if exploited allows a malicious user to perform an arbitrary number of authentication attempts using different passwords, and eventually gain access to the targeted account. | 2024-06-11 | 6.5 | CVE-2024-28022 [email protected] [email protected] |
Hitachi Energy–FOXMAN-UN | A vulnerability exists in the message queueing mechanism that if exploited can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code. | 2024-06-11 | 5.7 | CVE-2024-28023 [email protected] |
Huawei–HarmonyOS | Vulnerability of unauthorized screenshot capturing in the WMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 2024-06-14 | 6.8 | CVE-2024-36499 [email protected] |
Huawei–HarmonyOS | Memory management vulnerability in the boottime module Impact: Successful exploitation of this vulnerability can affect integrity. | 2024-06-14 | 5.6 | CVE-2024-36501 [email protected] |
Huawei–HarmonyOS | Function vulnerabilities in the Calendar module Impact: Successful exploitation of this vulnerability will affect availability. | 2024-06-14 | 5.9 | CVE-2024-5465 [email protected] |
Huawei–HarmonyOS | Vulnerability of insufficient permission verification in the NearLink module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 2024-06-14 | 4 | CVE-2024-5464 [email protected] |
ibericode–MC4WP | Missing Authorization vulnerability in ibericode MC4WP.This issue affects MC4WP: from n/a through 4.9.9. | 2024-06-11 | 5.3 | CVE-2023-51682 [email protected] |
IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash when using a specially crafted query on certain columnar tables by an authenticated user. IBM X-Force ID: 287613. | 2024-06-12 | 6.5 | CVE-2024-31881 [email protected] [email protected] |
IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5is vulnerable to a denial of service, under specific configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user. IBM X-Force ID: 287612. | 2024-06-12 | 5.3 | CVE-2023-29267 [email protected] [email protected] |
IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query under certain conditions. IBM X-Force ID: 285246. | 2024-06-12 | 5.3 | CVE-2024-28762 [email protected] [email protected] |
IBM–Jazz Reporting Service | IBM Jazz Reporting Service 7.0.3 stores user credentials in plain clear text which can be read by an admin user. IBM X-Force ID: 283363. | 2024-06-13 | 4.4 | CVE-2024-25052 [email protected] [email protected] |
IBM–Maximo Application Suite | IBM Maximo Asset Management 7.6.1.3 and IBM Maximo Application Suite 8.10 and 8.11 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 279973. | 2024-06-13 | 4 | CVE-2024-22333 [email protected] [email protected] [email protected] |
ideaboxcreations–PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) | The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ attribute within the plugin’s Link Effects widget in all versions up to, and including, 2.7.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-13 | 6.4 | CVE-2024-5787 [email protected] [email protected] [email protected] [email protected] |
If So Plugin–If-So Dynamic Content Personalization | Missing Authorization vulnerability in If So Plugin If-So Dynamic Content Personalization.This issue affects If-So Dynamic Content Personalization: from n/a through 1.7.1. | 2024-06-11 | 6.5 | CVE-2024-34820 [email protected] |
itsourcecode–Document Management System | A vulnerability classified as critical has been found in itsourcecode Document Management System 1.0. Affected is an unknown function of the file edithis.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268722 is the identifier assigned to this vulnerability. | 2024-06-15 | 6.3 | CVE-2024-6014 [email protected] [email protected] [email protected] [email protected] |
itsourcecode–Event Calendar | A vulnerability has been found in itsourcecode Event Calendar 1.0 and classified as critical. Affected by this vulnerability is the function regConfirm/regDelete of the file process.php. The manipulation of the argument userId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268699. | 2024-06-15 | 6.3 | CVE-2024-6009 [email protected] [email protected] [email protected] [email protected] |
itsourcecode–Online Book Store | A vulnerability, which was classified as critical, was found in itsourcecode Online Book Store up to 1.0. Affected is an unknown function of the file /edit_book.php. The manipulation of the argument image leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268698 is the identifier assigned to this vulnerability. | 2024-06-15 | 6.3 | CVE-2024-6008 [email protected] [email protected] [email protected] [email protected] |
itsourcecode–Online Book Store | A vulnerability was found in itsourcecode Online Book Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin_delete.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268721 was assigned to this vulnerability. | 2024-06-15 | 6.3 | CVE-2024-6013 [email protected] [email protected] [email protected] [email protected] |
itsourcecode–Online House Rental System | A vulnerability was found in itsourcecode Online House Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268458 is the identifier assigned to this vulnerability. | 2024-06-14 | 6.3 | CVE-2024-5981 [email protected] [email protected] [email protected] [email protected] |
itsourcecode–Online House Rental System | A vulnerability classified as critical was found in itsourcecode Online House Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument month_of leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268723. | 2024-06-15 | 6.3 | CVE-2024-6015 [email protected] [email protected] [email protected] [email protected] |
itsourcecode–Online Laundry Management System | A vulnerability, which was classified as critical, has been found in itsourcecode Online Laundry Management System 1.0. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268724. | 2024-06-15 | 6.3 | CVE-2024-6016 [email protected] [email protected] [email protected] [email protected] |
itsourcecode–Payroll Management System | A vulnerability was found in itsourcecode Payroll Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file print_payroll.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268142 is the identifier assigned to this vulnerability. | 2024-06-12 | 6.3 | CVE-2024-5898 [email protected] [email protected] [email protected] [email protected] |
jasonraimondi–url-to-png | @jmondi/url-to-png is a self-hosted URL to PNG utility. Versions prior to 2.0.3 are vulnerable to arbitrary file read if a threat actor uses the Playright’s screenshot feature to exploit the file wrapper. Version 2.0.3 mitigates this issue by requiring input URLs to be of protocol `http` or `https`. No known workarounds are available aside from upgrading. | 2024-06-10 | 5.3 | CVE-2024-37169 [email protected] [email protected] [email protected] [email protected] [email protected] |
jegtheme–Jeg Elementor Kit | The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the sg_general_toggle_tab_enable and sg_accordion_style attributes within the plugin’s JKit – Tabs and JKit – Accordion widget, respectively, in all versions up to, and including, 2.6.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-15 | 6.4 | CVE-2024-4479 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
jetmonsters–Stratum Elementor Widgets | The Stratum – Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘label_years’ attribute within the Countdown widget in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-15 | 6.4 | CVE-2024-5611 [email protected] [email protected] [email protected] |
ladela–WordPress Online Booking and Scheduling Plugin Bookly | The WordPress Online Booking and Scheduling Plugin – Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Color Profile parameter in all versions up to, and including, 23.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with the staff member role and Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-11 | 6.4 | CVE-2024-5584 [email protected] [email protected] |
leap13–Premium Addons for Elementor | The Premium Addons for Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via several parameters in all versions up to, and including, 4.10.33 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses and edits an injected element, and subsequently clicks the element with the mouse scroll wheel. | 2024-06-12 | 4.4 | CVE-2024-5553 [email protected] [email protected] [email protected] |
Lim Kai Yang–Grab & Save | Cross-Site Request Forgery (CSRF) vulnerability in Lim Kai Yang Grab & Save.This issue affects Grab & Save: from n/a through 1.0.4. | 2024-06-12 | 4.3 | CVE-2023-47845 [email protected] |
LINE Corporation–LINE client for iOS | The in-app browser of LINE client for iOS versions below 14.9.0 contains a Universal XSS (UXSS) vulnerability. This vulnerability allows for cross-site scripting (XSS) where arbitrary JavaScript can be executed in the top frame from an embedded iframe on any displayed web site within the in-app browser. The in-app browser is usually opened by tapping on URLs contained in chat messages, and for the attack to be successful, the victim must trigger a click event on a malicious iframe. If an iframe embedded in any website can be controlled by an attacker, this vulnerability could be exploited to capture or alter content displayed in the top frame, as well as user session information. This vulnerability affects LINE client for iOS versions below 14.9.0 and does not affect other LINE clients such as LINE client for Android. Please update LINE client for iOS to version 14.9.0 or higher. | 2024-06-12 | 6.1 | CVE-2024-5739 [email protected] |
MailerLite–MailerLite WooCommerce integration | Missing Authorization vulnerability in MailerLite MailerLite – WooCommerce integration.This issue affects MailerLite – WooCommerce integration: from n/a through 2.0.8. | 2024-06-11 | 4.3 | CVE-2023-52227 [email protected] |
Mandrill–wpMandrill | Missing Authorization vulnerability in Mandrill wpMandrill.This issue affects wpMandrill: from n/a through 1.33. | 2024-06-12 | 4.3 | CVE-2023-47828 [email protected] |
Mattermost–Mattermost | Mattermost Desktop App versions <=5.7.0 fail to correctly prompt for permission when opening external URLs which allows a remote attacker to force a victim over the Internet to run arbitrary programs on the victim’s system via custom URI schemes. | 2024-06-14 | 4.7 | CVE-2024-37182 [email protected] |
Matthias Pfefferle & Automattic–ActivityPub | Missing Authorization vulnerability in Matthias Pfefferle & Automattic ActivityPub.This issue affects ActivityPub: from n/a through 1.0.5. | 2024-06-11 | 6.5 | CVE-2023-52199 [email protected] |
Maxime Schoeni–Sublanguage | Missing Authorization vulnerability in Maxime Schoeni Sublanguage.This issue affects Sublanguage: from n/a through 2.9. | 2024-06-14 | 5.4 | CVE-2023-36695 [email protected] |
meowapps — database_cleaner | Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Jordy Meow Database Cleaner allows Relative Path Traversal.This issue affects Database Cleaner: from n/a through 1.0.5. | 2024-06-10 | 4.9 | CVE-2024-35712 [email protected] |
Metagauss–ProfileGrid | Missing Authorization vulnerability in Metagauss ProfileGrid.This issue affects ProfileGrid: from n/a through 5.6.6. | 2024-06-12 | 4.3 | CVE-2023-52117 [email protected] |
metersphere–metersphere | MeterSphere is an open source continuous testing platform. Prior to version 1.10.1-lts, the system’s step editor stores cross-site scripting vulnerabilities. Version 1.10.1-lts fixes this issue. | 2024-06-11 | 4 | CVE-2024-37161 [email protected] |
mgibbs189–Custom Field Suite | The Custom Field Suite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the ‘cfs[post_content]’ parameter versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-12 | 6.4 | CVE-2024-3559 [email protected] [email protected] [email protected] |
Microsoft–Azure File Sync | Microsoft Azure File Sync Elevation of Privilege Vulnerability | 2024-06-11 | 4.4 | CVE-2024-35253 [email protected] |
Microsoft–Azure Identity Library for .NET | Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability | 2024-06-11 | 5.5 | CVE-2024-35255 [email protected] |
Microsoft–Microsoft Dynamics 365 (on-premises) version 9.1 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | 2024-06-11 | 5.7 | CVE-2024-35263 [email protected] |
Microsoft–Microsoft Edge (Chromium-based) | Microsoft Edge (Chromium-based) Spoofing Vulnerability | 2024-06-13 | 5.4 | CVE-2024-30058 [email protected] |
Microsoft–Microsoft Edge for iOS | Microsoft Edge for iOS Spoofing Vulnerability | 2024-06-13 | 5.4 | CVE-2024-30057 [email protected] |
Microsoft–Microsoft Edge for iOS | Microsoft Edge (Chromium-based) Spoofing Vulnerability | 2024-06-13 | 4.3 | CVE-2024-38083 [email protected] |
Microsoft–Microsoft Visual Studio 2017 version 15.9 (includes 15.0 – 15.8) | Visual Studio Remote Code Execution Vulnerability | 2024-06-11 | 4.7 | CVE-2024-30052 [email protected] |
Microsoft–Microsoft Visual Studio 2022 version 17.10 | Visual Studio Elevation of Privilege Vulnerability | 2024-06-11 | 6.7 | CVE-2024-29060 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Distributed File System (DFS) Remote Code Execution Vulnerability | 2024-06-11 | 6.7 | CVE-2024-30063 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Container Manager Service Elevation of Privilege Vulnerability | 2024-06-11 | 6.8 | CVE-2024-30076 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Themes Denial of Service Vulnerability | 2024-06-11 | 5.5 | CVE-2024-30065 [email protected] |
Microsoft–Windows 10 Version 1809 | Winlogon Elevation of Privilege Vulnerability | 2024-06-11 | 5.5 | CVE-2024-30066 [email protected] |
Microsoft–Windows 10 Version 1809 | Winlogon Elevation of Privilege Vulnerability | 2024-06-11 | 5.5 | CVE-2024-30067 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Cryptographic Services Information Disclosure Vulnerability | 2024-06-11 | 5.5 | CVE-2024-30096 [email protected] |
Microsoft–Windows 10 Version 1809 | Windows Remote Access Connection Manager Information Disclosure Vulnerability | 2024-06-11 | 4.7 | CVE-2024-30069 [email protected] |
Minoji–MJ Update History | Missing Authorization vulnerability in Minoji MJ Update History.This issue affects MJ Update History: from n/a through 1.0.4. | 2024-06-11 | 4.3 | CVE-2024-35671 [email protected] |
mlewand–ckeditor-plugin-openlink | The Open Link is a CKEditor plugin, extending context menu with a possibility to open link in a new tab. The vulnerability allowed to execute JavaScript code by abusing link href attribute. It affects all users using the Open Link plugin at version < **1.0.5**. | 2024-06-14 | 6.1 | CVE-2024-37888 [email protected] |
MoreConvert–MC Woocommerce Wishlist | Missing Authorization vulnerability in MoreConvert MC Woocommerce Wishlist.This issue affects MC Woocommerce Wishlist: from n/a through 1.7.8. | 2024-06-11 | 5.3 | CVE-2024-34813 [email protected] |
MoreConvert–MC Woocommerce Wishlist | Missing Authorization vulnerability in MoreConvert MC Woocommerce Wishlist.This issue affects MC Woocommerce Wishlist: from n/a through 1.7.2. | 2024-06-11 | 5.3 | CVE-2024-34819 [email protected] |
n/a–n/a | A Directory Traversal vulnerability in iceice666 ResourcePack Server before v1.0.8 allows a remote attacker to disclose files on the server, via setPath in ResourcePackFileServer.kt. | 2024-06-10 | 6.5 | CVE-2024-35474 [email protected] |
n/a–Newspaper – News & WooCommerce WordPress Theme | The Newspaper theme for WordPress is vulnerable to Stored Cross-Site Scripting via attachment meta in the archive page in all versions up to, and including, 12.6.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-15 | 5.5 | CVE-2024-3815 [email protected] [email protected] |
N/A–Piotnet Forms | Missing Authorization vulnerability in Piotnet Forms.This issue affects Piotnet Forms: from n/a through 1.0.29. | 2024-06-12 | 5.3 | CVE-2023-51413 [email protected] |
namithjawahar–Insert Post Ads | Missing Authorization vulnerability in namithjawahar Insert Post Ads.This issue affects Insert Post Ads: from n/a through 1.3.2. | 2024-06-11 | 5.3 | CVE-2024-35665 [email protected] |
Navneil Naicker–ACF Photo Gallery Field | Missing Authorization vulnerability in Navneil Naicker ACF Photo Gallery Field.This issue affects ACF Photo Gallery Field: from n/a through 2.6. | 2024-06-11 | 4.3 | CVE-2024-23518 [email protected] |
NervyThemes–SKU Label Changer For WooCommerce | Missing Authorization vulnerability in NervyThemes SKU Label Changer For WooCommerce.This issue affects SKU Label Changer For WooCommerce: from n/a through 3.0. | 2024-06-14 | 6.5 | CVE-2023-29174 [email protected] |
NetApp–StorageGRID (formerly StorageGRID Webscale) | StorageGRID (formerly StorageGRID Webscale) versions prior to 11.7.0.9 and 11.8.0.5 are susceptible to disclosure of sensitive information via complex MiTM attacks due to a vulnerability in the SSH cryptographic implementation. | 2024-06-14 | 5.3 | CVE-2024-21988 [email protected] |
Netentsec–NS-ASG Application Security Gateway | A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /protocol/iscgwtunnel/deleteiscgwrouteconf.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268695. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | 2024-06-15 | 6.3 | CVE-2024-6007 [email protected] [email protected] [email protected] [email protected] |
netgsm — netgsm | Missing Authorization vulnerability in Netgsm.This issue affects Netgsm: from n/a through 2.9.16. | 2024-06-10 | 6.3 | CVE-2024-4746 [email protected] |
netweblogic–Events Manager Calendar, Bookings, Tickets, and more! | The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘event’, ‘location’, and ‘event_category’ shortcodes in all versions up to, and including, 6.4.7.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-12 | 6.4 | CVE-2024-3492 [email protected] [email protected] |
nextcloud–security-advisories | user_oidc app is an OpenID Connect user backend for Nextcloud. Missing access control on the ID4me endpoint allows an attacker to register an account eventually getting access to data that is available to all registered users. It is recommended that the OpenID Connect user backend is upgraded to 3.0.0 (Nextcloud 20-23), 4.0.0 (Nexcloud 24) or 5.0.0 (Nextcloud 25-28). | 2024-06-14 | 6.3 | CVE-2024-37312 [email protected] [email protected] [email protected] |
nextcloud–security-advisories | user_oidc app is an OpenID Connect user backend for Nextcloud. An attacker could potentially trick the app into accepting a request that is not signed by the correct server. It is recommended that the Nextcloud user_oidc app is upgraded to 1.3.5, 2.0.0, 3.0.0, 4.0.0 or 5.0.0. | 2024-06-14 | 5.4 | CVE-2024-37886 [email protected] [email protected] [email protected] |
nextcloud–security-advisories | Nextcloud Calendar is a calendar app for Nextcloud. Authenticated users could create an event with manipulated attachment data leading to a bad redirect for participants when clicked. It is recommended that the Nextcloud Calendar App is upgraded to 4.6.8 or 4.7.2. | 2024-06-14 | 4.6 | CVE-2024-37316 [email protected] [email protected] [email protected] |
nextcloud–security-advisories | The Nextcloud Notes app is a distraction free notes taking app for Nextcloud. If an attacker managed to share a folder called `Notes/` with a newly created user before they logged in, the Notes app would use that folder store the personal notes. It is recommended that the Nextcloud Notes app is upgraded to 4.9.3. | 2024-06-14 | 4.6 | CVE-2024-37317 [email protected] [email protected] [email protected] |
nextcloud–security-advisories | Nextcloud Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. A user with access to a deck board was able to access comments and attachments of already deleted cards. It is recommended that the Nextcloud Deck app is upgraded to 1.6.6 or 1.7.5 or 1.8.7 or 1.9.6 or 1.11.3 or 1.12.1. | 2024-06-14 | 4.3 | CVE-2024-37883 [email protected] [email protected] [email protected] |
nicheaddons–Events Addon for Elementor | The Events Addon for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Basic Slider, Upcoming Events, and Schedule widgets in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-11 | 6.4 | CVE-2024-4669 [email protected] [email protected] [email protected] [email protected] [email protected] |
NuGet–NuGetGallery | NuGet Gallery is a package repository that powers nuget.org. The NuGetGallery has a security vulnerability related to its handling of autolinks in Markdown content. While the platform properly filters out JavaScript from standard links, it does not adequately sanitize autolinks. This oversight allows attackers to exploit autolinks as a vector for Cross-Site Scripting (XSS) attacks. When a user inputs a Markdown autolink such as `<javascript:alert(1)>`, the link is rendered without proper sanitization. This means that the JavaScript code within the autolink can be executed by the browser, leading to an XSS attack. Version 2024.05.28 contains a patch for this issue. | 2024-06-12 | 6.1 | CVE-2024-37304 [email protected] [email protected] [email protected] |
nvidia–GPU display driver, vGPU software, and Cloud Gaming | NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service. | 2024-06-13 | 5.5 | CVE-2024-0092 [email protected] |
nvidia–NVIDIA Triton Inference Server | NVIDIA Triton Inference Server for Linux contains a vulnerability where a user may cause an incorrect Initialization of resource by network issue. A successful exploit of this vulnerability may lead to information disclosure. | 2024-06-13 | 5.4 | CVE-2024-0103 [email protected] |
nvidia–vGPU software and Cloud Gaming | NVIDIA vGPU software for Windows and Linux contains a vulnerability where unprivileged users could execute privileged operations on the host. A successful exploit of this vulnerability might lead to data tampering, escalation of privileges, and denial of service. | 2024-06-13 | 6.3 | CVE-2024-0085 [email protected] |
nvidia–vGPU software and Cloud Gaming | NVIDIA GPU software for Linux contains a vulnerability where it can expose sensitive information to an actor that is not explicitly authorized to have access to that information. A successful exploit of this vulnerability might lead to information disclosure. | 2024-06-13 | 6.5 | CVE-2024-0093 [email protected] |
nvidia–vGPU software and Cloud Gaming | NVIDIA vGPU software for Linux contains a vulnerability where the software can dereference a NULL pointer. A successful exploit of this vulnerability might lead to denial of service and undefined behavior in the vGPU plugin. | 2024-06-13 | 5.5 | CVE-2024-0086 [email protected] |
nvidia–vGPU software and Cloud Gaming | NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where an untrusted guest VM can cause improper control of the interaction frequency in the host. A successful exploit of this vulnerability might lead to denial of service. | 2024-06-13 | 5.5 | CVE-2024-0094 [email protected] |
oceanwp–Ocean Extra | The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Flickr widget in all versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-11 | 6.4 | CVE-2024-5531 [email protected] [email protected] |
ONTRAPORT Inc.–PilotPress | Missing Authorization vulnerability in ONTRAPORT Inc. PilotPress.This issue affects PilotPress: from n/a through 2.0.30. | 2024-06-10 | 5.3 | CVE-2024-23524 [email protected] |
open-quantum-safe–liboqs | liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. A control-flow timing lean has been identified in the reference implementation of the Kyber key encapsulation mechanism when it is compiled with Clang 15-18 for `-Os`, `-O1`, and other compilation options. A proof-of-concept local attack on the reference implementation leaks the entire ML-KEM 512 secret key in ~10 minutes using end-to-end decapsulation timing measurements. The issue has been fixed in version 0.10.1. As a possible workaround, some compiler options may produce vectorized code that does not leak secret information, however relying on these compiler options as a workaround may not be reliable. | 2024-06-10 | 5.9 | CVE-2024-36405 [email protected] [email protected] [email protected] [email protected] |
OpenPrinting–cups | OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue. | 2024-06-11 | 4.4 | CVE-2024-35235 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
OpenText–NetIQ Access Manager | This allows the information exposure to unauthorized users. This issue affects NetIQ Access Manager using version 4.5 or before | 2024-06-11 | 6.5 | CVE-2020-11843 [email protected] [email protected] |
ovic_importer_project — ovic_importer | Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Ovic Team Ovic Importer allows Path Traversal.This issue affects Ovic Importer: from n/a through 1.6.3. | 2024-06-10 | 6.5 | CVE-2024-35754 [email protected] |
Photo Gallery Team–Photo Gallery by 10Web | Missing Authorization vulnerability in Photo Gallery Team Photo Gallery by 10Web.This issue affects Photo Gallery by 10Web: from n/a through 1.8.24. | 2024-06-11 | 4.3 | CVE-2024-35628 [email protected] |
Podlove–Podlove Podcast Publisher | Missing Authorization vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.1.0. | 2024-06-11 | 4.3 | CVE-2024-32143 [email protected] |
quantumcloud–AI Infographic Maker | The AI Infographic Maker plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the qcld_openai_title_generate_desc AJAX action in all versions up to, and including, 4.7.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary post titles. | 2024-06-15 | 4.3 | CVE-2024-5858 [email protected] [email protected] [email protected] |
RabbitLoader–RabbitLoader | Missing Authorization vulnerability in RabbitLoader.This issue affects RabbitLoader: from n/a through 2.19.13. | 2024-06-10 | 5.4 | CVE-2024-21751 [email protected] |
Red Hat–Red Hat Enterprise Linux 6 | A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink. | 2024-06-12 | 4.7 | CVE-2024-5742 [email protected] [email protected] [email protected] |
Red Hat–Red Hat Quay 3 | A vulnerability was found in Quay. If an attacker can obtain the client ID for an application, they can use an OAuth token to authenticate despite not having access to the organization from which the application was created. This issue is limited to authentication and not authorization. However, in configurations where endpoints rely only on authentication, a user may authenticate to applications they otherwise have no access to. | 2024-06-12 | 4.2 | CVE-2024-5891 [email protected] [email protected] |
Repute Infosystems–BookingPress | Missing Authorization vulnerability in Repute Infosystems BookingPress.This issue affects BookingPress: from n/a through 1.0.82. | 2024-06-11 | 6.5 | CVE-2024-34799 [email protected] |
Revolut–Revolut Gateway for WooCommerce | Missing Authorization vulnerability in Revolut Revolut Gateway for WooCommerce.This issue affects Revolut Gateway for WooCommerce: from n/a through 4.9.7. | 2024-06-11 | 4.3 | CVE-2023-52224 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, a user password can be reset from an unauthenticated attacker. The attacker does not get access to the new password. But this can be annoying for the user. This attack is also dependent on some password reset functionalities being enabled. It also requires the system using php 7, which is not an officially supported version. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 6.5 | CVE-2024-36407 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in the connectors file verification allows for a server-side request forgery attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 6.5 | CVE-2024-36414 [email protected] |
salesagility — suitecrm | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in the import module error view allows for a cross-site scripting attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 5.4 | CVE-2024-36413 [email protected] |
salesagility–SuiteCRM | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, unchecked input allows for open re-direct. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | 5.4 | CVE-2024-36406 [email protected] |
salesagility–SuiteCRM-Core | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. A vulnerability in versions prior to 8.6.1 allows for Host Header Injection when directly accessing the `/legacy` route. Version 8.6.1 contains a patch for the issue. | 2024-06-10 | 4.3 | CVE-2024-36419 [email protected] |
Salesforce–Pardot | Missing Authorization vulnerability in Salesforce Pardot.This issue affects Pardot: from n/a through 2.1.0. | 2024-06-11 | 4.3 | CVE-2024-32148 [email protected] |
SAP_SE–SAP BW/4HANA Transformation and Data Transfer Process | SAP BW/4HANA Transformation and Data Transfer Process (DTP) allows an authenticated attacker to gain higher access levels than they should have by exploiting improper authorization checks. This results in escalation of privileges. It has no impact on the confidentiality of data but may have low impacts on the integrity and availability of the application. | 2024-06-11 | 5.5 | CVE-2024-37176 [email protected] [email protected] |
SAP_SE–SAP CRM WebClient UI | Due to insufficient input validation, SAP CRM WebClient UI allows an unauthenticated attacker to craft a URL link which embeds a malicious script. When a victim clicks on this link, the script will be executed in the victim’s browser giving the attacker the ability to access and/or modify information with no effect on availability of the application. | 2024-06-11 | 6.1 | CVE-2024-34686 [email protected] [email protected] |
SAP_SE–SAP Document Builder | An authenticated attacker can upload malicious file to SAP Document Builder service. When the victim accesses this file, the attacker is allowed to access, modify, or make the related information unavailable in the victim’s browser. | 2024-06-11 | 6.5 | CVE-2024-34683 [email protected] [email protected] |
SAP_SE–SAP Financial Consolidation | SAP Financial Consolidation does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. These endpoints are exposed over the network. The vulnerability can exploit resources beyond the vulnerable component. On successful exploitation, an attacker can cause limited impact to confidentiality of the application. | 2024-06-11 | 5 | CVE-2024-37178 [email protected] [email protected] |
SAP_SE–SAP NetWeaver and ABAP platform | SAP NetWeaver and ABAP platform allows an attacker to impede performance for legitimate users by crashing or flooding the service. An impact of this Denial of Service vulnerability might be long response delays and service interruptions, thus degrading the service quality experienced by legitimate users causing high impact on availability of the application. | 2024-06-11 | 6.5 | CVE-2024-33001 [email protected] [email protected] |
SAP_SE–SAP NetWeaver AS Java | SAP NetWeaver AS Java (CAF – Guided Procedures) allows an unauthenticated user to access non-sensitive information about the server which would otherwise be restricted causing low impact on confidentiality of the application. | 2024-06-11 | 5.3 | CVE-2024-28164 [email protected] [email protected] |
SAP_SE–SAP S/4HANA (Manage Incoming Payment Files) | Manage Incoming Payment Files (F1680) of SAP S/4HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. As a result, it has high impact on integrity and no impact on the confidentiality and availability of the system. | 2024-06-11 | 6.5 | CVE-2024-34691 [email protected] [email protected] |
SAP_SE–SAP Student Life Cycle Management | SAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to access and edit non-sensitive report variants that are typically restricted, causing minimal impact on the confidentiality and integrity of the application. | 2024-06-11 | 5.4 | CVE-2024-34690 [email protected] [email protected] |
sc_filechecker_project — sc_filechecker | Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Siteclean SC filechecker allows Path Traversal, File Manipulation.This issue affects SC filechecker: from n/a through 0.6. | 2024-06-10 | 6.5 | CVE-2024-35743 [email protected] |
Schneider Electric–EVlink Home Smart | CWE-668: Exposure of the Resource Wrong Sphere vulnerability exists that exposes a SSH interface over the product network interface. This does not allow to directly exploit the product or make any unintended operation as the SSH interface access is protected by an authentication mechanism. Impacts are limited to port scanning and fingerprinting activities as well as attempts to perform a potential denial of service attack on the exposed SSH interface. | 2024-06-12 | 6.5 | CVE-2024-5313 [email protected] |
Schneider Electric–Modicon M340 | CWE-552: Files or Directories Accessible to External Parties vulnerability exists which may prevent user to update the device firmware and prevent proper behavior of the webserver when specific files or directories are removed from the filesystem. | 2024-06-12 | 6.5 | CVE-2024-5056 [email protected] |
Schneider Electric–PowerLogic P5 | CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially crafted reset token is entered into the front panel of the device. | 2024-06-12 | 6.1 | CVE-2024-5559 [email protected] |
Schneider Electric–Sage 1410 | CWE-252: Unchecked Return Value vulnerability exists that could cause denial of service of the device when an attacker sends a specially crafted HTTP request. | 2024-06-12 | 5.9 | CVE-2024-37039 [email protected] |
Schneider Electric–Sage 1410 | CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability exists that could allow a user with access to the device’s web interface to cause a fault on the device when sending a malformed HTTP request. | 2024-06-12 | 5.4 | CVE-2024-37040 [email protected] |
Schneider Electric–Sage 1410 | CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service of the device’s web interface when an attacker sends a specially crafted HTTP request. | 2024-06-12 | 5.3 | CVE-2024-5560 [email protected] |
Schneider Electric–SpaceLogic AS-P | CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability exists that could cause escalation of privileges when an attacker abuses a limited admin account. | 2024-06-12 | 6.4 | CVE-2024-5558 [email protected] |
Schneider Electric–SpaceLogic AS-P | CWE-532: Insertion of Sensitive Information into Log File vulnerability exists that could cause exposure of SNMP credentials when an attacker has access to the controller logs. | 2024-06-12 | 4.5 | CVE-2024-5557 [email protected] |
seedprod — rafflepress | Missing Authorization vulnerability in RafflePress Giveaways and Contests by RafflePress.This issue affects Giveaways and Contests by RafflePress: from n/a through 1.12.4. | 2024-06-10 | 6.3 | CVE-2024-4745 [email protected] |
SendPress–SendPress Newsletters | Missing Authorization vulnerability in SendPress SendPress Newsletters.This issue affects SendPress Newsletters: from n/a through 1.23.11.6. | 2024-06-14 | 5.3 | CVE-2023-35040 [email protected] |
Siemens–Mendix Applications using Mendix 10 | A vulnerability has been identified in Mendix Applications using Mendix 10 (All versions < V10.11.0), Mendix Applications using Mendix 10 (V10.6) (All versions < V10.6.9), Mendix Applications using Mendix 9 (All versions >= V9.3.0 < V9.24.22). Affected applications could allow users with the capability to manage a role to elevate the access rights of users with that role. Successful exploitation requires to guess the id of a target role which contains the elevated access rights. | 2024-06-11 | 5.9 | CVE-2024-33500 [email protected] |
Siemens–SIMATIC CP 1542SP-1 | A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.4.8), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.4.8). The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains. This could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers. | 2024-06-11 | 4.9 | CVE-2023-50763 [email protected] [email protected] [email protected] |
Siemens–SINEC Traffic Analyzer | A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server stored the password in cleartext. This could allow attacker in a privileged position to obtain access passwords. | 2024-06-11 | 6.3 | CVE-2024-35208 [email protected] |
Siemens–SINEC Traffic Analyzer | A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is not enforcing HSTS. This could allow an attacker to perform downgrade attacks exposing confidential information. | 2024-06-11 | 6.5 | CVE-2024-35210 [email protected] |
Siemens–SINEC Traffic Analyzer | A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server, after a successful login, sets the session cookie on the browser, without applying any security attributes (such as “Secure”, “HttpOnly”, or “SameSite”). | 2024-06-11 | 6.5 | CVE-2024-35211 [email protected] |
SoftLab–Integrate Google Drive | Missing Authorization vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.3. | 2024-06-12 | 5.4 | CVE-2023-52177 [email protected] |
SoftLab–Radio Player | Missing Authorization vulnerability in SoftLab Radio Player.This issue affects Radio Player: from n/a through 2.0.73. | 2024-06-11 | 5.3 | CVE-2024-34753 [email protected] |
Soliloquy Team–Slider by Soliloquy | Missing Authorization vulnerability in Soliloquy Team Slider by Soliloquy.This issue affects Slider by Soliloquy: from n/a through 2.7.2. | 2024-06-11 | 4.3 | CVE-2023-51519 [email protected] |
SourceCodester–Best Online News Portal | A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268461 was assigned to this vulnerability. | 2024-06-14 | 6.3 | CVE-2024-5985 [email protected] [email protected] [email protected] [email protected] |
SourceCodester–Cab Management System | A vulnerability classified as critical has been found in SourceCodester Cab Management System 1.0. This affects an unknown part of the file /cms/classes/Users.php?f=delete_client. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268137 was assigned to this vulnerability. | 2024-06-12 | 6.3 | CVE-2024-5893 [email protected] [email protected] [email protected] [email protected] |
SourceCodester–Employee and Visitor Gate Pass Logging System | A vulnerability, which was classified as critical, has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. This issue affects the function delete_users of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268139. | 2024-06-12 | 6.3 | CVE-2024-5895 [email protected] [email protected] [email protected] [email protected] |
SourceCodester–Employee and Visitor Gate Pass Logging System | A vulnerability has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=log_visitor. The manipulation of the argument name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268141 was assigned to this vulnerability. | 2024-06-12 | 4.3 | CVE-2024-5897 [email protected] [email protected] [email protected] [email protected] |
specialk–Dashboard Widgets Suite | The Dashboard Widgets Suite plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘tab’ parameter in all versions up to, and including, 3.4.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2024-06-13 | 6.1 | CVE-2024-0979 [email protected] [email protected] |
strapi–strapi | Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it’s manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch. | 2024-06-12 | 5.3 | CVE-2024-31217 [email protected] [email protected] |
stylemix–WordPress Header Builder Plugin Pearl | The WordPress Header Builder Plugin – Pearl plugin for WordPress is vulnerable to unauthorized site option deletion due to a missing validation and capability checks on the stm_hb_delete() function in all versions up to, and including, 1.3.7. This makes it possible for unauthenticated attackers to delete arbitrary options that can be used to perform a denial of service attack on a site. | 2024-06-12 | 6.5 | CVE-2024-5468 [email protected] [email protected] |
tabrisrp–WPS Hide Login | The WPS Hide Login plugin for WordPress is vulnerable to Login Page Disclosure in all versions up to, and including, 1.9.15.2. This is due to a bypass that is created when the ‘action=postpass’ parameter is supplied. This makes it possible for attackers to easily discover any login page that may have been hidden by the plugin. | 2024-06-11 | 5.3 | CVE-2024-2473 [email protected] [email protected] |
tagDiv–tagDiv Composer | The tagDiv Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘single’ module in all versions up to, and including, 4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-15 | 5.5 | CVE-2024-3814 [email protected] [email protected] |
Tagembed–Tagembed | Missing Authorization vulnerability in Tagembed.This issue affects Tagembed: from n/a through 5.5. | 2024-06-11 | 5.4 | CVE-2024-34804 [email protected] |
TechnoVama–Quotes for WooCommerce | Missing Authorization vulnerability in TechnoVama Quotes for WooCommerce.This issue affects Quotes for WooCommerce: from n/a through 2.0.1. | 2024-06-12 | 4.3 | CVE-2023-51680 [email protected] |
Tenable–Security Center | An improper privilege management vulnerability exists in Tenable Security Center where an authenticated, remote attacker could view unauthorized objects and launch scans without having the required privileges | 2024-06-12 | 5.4 | CVE-2024-5759 [email protected] |
Teplitsa of social technologies–Leyka | Missing Authorization vulnerability in Teplitsa of social technologies Leyka.This issue affects Leyka: from n/a through 3.31.1. | 2024-06-11 | 5.3 | CVE-2024-35683 [email protected] |
Termly–Cookie Consent | Missing Authorization vulnerability in Termly Cookie Consent.This issue affects Cookie Consent: from n/a through 3.2. | 2024-06-11 | 5.3 | CVE-2024-35692 [email protected] |
The Newsletter Team–Newsletter – API v1 and v2 addon for Newsletter | The Newsletter – API v1 and v2 addon plugin for WordPress is vulnerable to unauthorized subscribers management due to PHP type juggling issue on the check_api_key function in all versions up to, and including, 2.4.5. This makes it possible for unauthenticated attackers to list, create or delete newsletter subscribers. This issue affects only sites running the PHP version below 8.0 | 2024-06-12 | 6.5 | CVE-2024-5674 [email protected] [email protected] |
ThemeBoy–SportsPress Sports Club & League Manager | Missing Authorization vulnerability in ThemeBoy SportsPress – Sports Club & League Manager.This issue affects SportsPress – Sports Club & League Manager: from n/a through 2.7.20. | 2024-06-11 | 4.3 | CVE-2024-34824 [email protected] |
themeisle — product_addons_\&_fields_for_woocommerce | Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) vulnerability in Themeisle PPOM for WooCommerce allows Code Inclusion.This issue affects PPOM for WooCommerce: from n/a through 32.0.20. | 2024-06-10 | 5.3 | CVE-2024-35728 [email protected] |
TMS–Amelia | Missing Authorization vulnerability in TMS Amelia ameliabooking.This issue affects Amelia: from n/a through 1.0.98. | 2024-06-10 | 5.3 | CVE-2024-22298 [email protected] |
Tobias Conrad–Builder for WooCommerce reviews shortcodes ReviewShort | Missing Authorization vulnerability in Tobias Conrad Builder for WooCommerce reviews shortcodes – ReviewShort.This issue affects Builder for WooCommerce reviews shortcodes – ReviewShort: from n/a through 1.01.5. | 2024-06-11 | 5.3 | CVE-2024-34763 [email protected] |
Tobias Conrad–Design for Contact Form 7 Style WordPress Plugin CF7 WOW Styler | Missing Authorization vulnerability in Tobias Conrad Design for Contact Form 7 Style WordPress Plugin – CF7 WOW Styler.This issue affects Design for Contact Form 7 Style WordPress Plugin – CF7 WOW Styler: from n/a through 1.6.4. | 2024-06-11 | 6.3 | CVE-2024-34826 [email protected] |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The Toshiba printers do not implement privileges separation. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.7 | CVE-2024-27146 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Passwords are stored in clear-text logs. An attacker can retrieve passwords. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.2 | CVE-2024-27154 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The session cookies, used for authentication, are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.8 | CVE-2024-27156 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | The sessions are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.8 | CVE-2024-27157 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | All the Toshiba printers contain a shell script using the same hardcoded key to encrypt logs. An attacker can decrypt the encrypted files using the hardcoded key. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.2 | CVE-2024-27159 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | All the Toshiba printers contain a shell script using the same hardcoded key to encrypt logs. An attacker can decrypt the encrypted files using the hardcoded key. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.2 | CVE-2024-27160 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | all the Toshiba printers have programs containing a hardcoded key used to encrypt files. An attacker can decrypt the encrypted files using the hardcoded key. Insecure algorithm is used for the encryption. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.2 | CVE-2024-27161 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Toshiba printers provide a web interface that will load the JavaScript file. The file contains insecure codes vulnerable to XSS and is loaded inside all the webpages provided by the printer. An attacker can steal the cookie of an admin user. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.1 | CVE-2024-27162 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Toshiba printers will display the password of the admin user in clear-text and additional passwords when sending 2 specific HTTP requests to the internal API. An attacker stealing the cookie of an admin or abusing a XSS vulnerability can recover this password in clear-text and compromise the printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the “Base Score” of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.5 | CVE-2024-27163 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | An attacker with admin access can install rogue applications. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 6.7 | CVE-2024-27180 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Toshiba printers use XML communication for the API endpoint provided by the printer. For the endpoint, XML parsing library is used and it is vulnerable to a time-based blind XML External Entity (XXE) vulnerability. An attacker can DoS the printers by sending a HTTP request without authentication. An attacker can exploit the XXE to retrieve information. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 5.9 | CVE-2024-27141 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Toshiba printers use XML communication for the API endpoint provided by the printer. For the endpoint, XML parsing library is used and it is vulnerable to a time-based blind XML External Entity (XXE) vulnerability. An attacker can DoS the printers. An attacker can exploit the XXE to retrieve information. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 5.9 | CVE-2024-27142 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Remote Command program allows an attacker to read any file using a Local File Inclusion vulnerability. An attacker can read any file on the printer. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 4.4 | CVE-2024-27175 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Toshiba Tec Corporation–Toshiba Tec e-Studio multi-function peripheral (MFP) | Admin cookies are written in clear-text in logs. An attacker can retrieve them and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL. | 2024-06-14 | 4.7 | CVE-2024-27179 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 ecc0f906-8666-484c-bcf8-c3b7520a72f0 |
Trellix–Intrusion Prevention System (IPS) Manager | A vulnerability in the IPS Manager, Central Manager, and Local Manager communication workflow allows an attacker to control the destination of a request by manipulating the parameter, thereby leveraging sensitive information. | 2024-06-14 | 6.8 | CVE-2024-5731 [email protected] |
Trellix–Trellix EDR UI (XConsole) | An Cross site scripting vulnerability in the EDR XConsole before this release allowed an attacker to potentially leverage an XSS/HTML-Injection using command line variables. A malicious threat actor could execute commands on the victim’s browser for sending carefully crafted malicious links to the EDR XConsole end user. | 2024-06-13 | 4.1 | CVE-2024-4176 [email protected] |
Trend Micro, Inc.–Trend Micro Apex One | A link following vulnerability in the Trend Micro Apex One and Apex One as a Service Damage Cleanup Engine could allow a local attacker to create a denial-of-service condition on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | 2024-06-10 | 6.1 | CVE-2024-36306 [email protected] [email protected] |
Trend Micro, Inc.–Trend Micro Apex One | A security agent link following vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information about the agent on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | 2024-06-10 | 4.7 | CVE-2024-36307 [email protected] [email protected] |
Trend Micro, Inc.–Trend Micro InterScan Web Security Virtual Appliance | A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 could allow an attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | 2024-06-10 | 5.4 | CVE-2024-36359 [email protected] [email protected] |
Trend Micro, Inc.–Trend Micro VPN Proxy One Pro | Trend Micro VPN Proxy One Pro, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite or create attack but is limited to local Denial of Service (DoS) and under specific conditions can lead to elevation of privileges. | 2024-06-10 | 5.3 | CVE-2024-36473 [email protected] [email protected] |
TreyWW–MyFinances | MyFinances is a web application for managing finances. MyFinances has a way to access other customer invoices while signed in as a user. This method allows an actor to access PII and financial information from another account. The vulnerability is fixed in 0.4.6. | 2024-06-14 | 6.5 | CVE-2024-37889 [email protected] [email protected] |
uniview — nvr301-04s2-p4_firmware | Uniview NVR301-04S2-P4 is vulnerable to reflected cross-site scripting attack (XSS). An attacker could send a user a URL that if clicked on could execute malicious JavaScript in their browser. This vulnerability also requires authentication before it can be exploited, so the scope and severity is limited. Also, even if JavaScript is executed, no additional benefits are obtained. | 2024-06-10 | 5.4 | CVE-2024-3850 [email protected] |
upunzipper_project — upunzipper | Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Ravidhu Dissanayake Upunzipper allows Path Traversal, File Manipulation.This issue affects Upunzipper: from n/a through 1.0.0. | 2024-06-10 | 6.5 | CVE-2024-35744 [email protected] |
Vark–Pricing Deals for WooCommerce | Missing Authorization vulnerability in Vark Pricing Deals for WooCommerce.This issue affects Pricing Deals for WooCommerce: from n/a through 2.0.3.2. | 2024-06-12 | 5.3 | CVE-2023-41240 [email protected] |
vberkel–Schema App Structured Data | The Schema App Structured Data plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.0. This is due to missing or incorrect nonce validation on the MarkUpdate function. This makes it possible for unauthenticated attackers to update and delete post metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2024-06-14 | 4.3 | CVE-2024-0892 [email protected] [email protected] |
Verint–WFO | Verint – CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) | 2024-06-13 | 6.1 | CVE-2024-36395 [email protected] |
vsourz1td–Advanced Contact form 7 DB | The Advanced Contact form 7 DB plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0.2 via the wp-content/uploads/advanced-cf7-upload directory. This makes it possible for unauthenticated attackers to extract sensitive data uploaded via this plugin through a form. | 2024-06-11 | 5.3 | CVE-2024-3723 [email protected] [email protected] |
vsourz1td–Advanced Contact form 7 DB | The Advanced Contact form 7 DB plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ‘vsz_cf7_export_to_excel’ function in versions up to, and including, 2.0.2. This makes it possible for unauthenticated attackers to download the entry data for submitted forms. | 2024-06-11 | 5.3 | CVE-2024-4319 [email protected] [email protected] |
WebCodingPlace–Product Expiry for WooCommerce | Missing Authorization vulnerability in WebCodingPlace Product Expiry for WooCommerce.This issue affects Product Expiry for WooCommerce: from n/a through 2.5. | 2024-06-11 | 5.4 | CVE-2023-52179 [email protected] |
webtechstreet–Elementor Addon Elements | The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s Twitter Widget in all versions up to, and including, 1.13.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-12 | 5.4 | CVE-2024-2092 [email protected] [email protected] [email protected] |
WebToffee–WordPress Backup & Migration | Missing Authorization vulnerability in WebToffee WordPress Backup & Migration.This issue affects WordPress Backup & Migration: from n/a through 1.4.3. | 2024-06-11 | 5.4 | CVE-2023-52183 [email protected] |
weDevs–weDocs | Missing Authorization vulnerability in weDevs weDocs.This issue affects weDocs: from n/a through 2.1.4. | 2024-06-11 | 5.3 | CVE-2024-34442 [email protected] |
weDevs–weMail | Missing Authorization vulnerability in weDevs weMail.This issue affects weMail: from n/a through 1.14.2. | 2024-06-11 | 5.3 | CVE-2024-34822 [email protected] |
weDevs–WooCommerce Conversion Tracking | Missing Authorization vulnerability in weDevs WooCommerce Conversion Tracking.This issue affects WooCommerce Conversion Tracking: from n/a through 2.0.11. | 2024-06-11 | 4.3 | CVE-2023-52217 [email protected] |
weForms–weForms | Missing Authorization vulnerability in weForms.This issue affects weForms: from n/a through 1.6.18. | 2024-06-12 | 4.3 | CVE-2023-51524 [email protected] |
Welcart Inc.–Welcart e-Commerce | Missing Authorization vulnerability in Welcart Inc. Welcart e-Commerce.This issue affects Welcart e-Commerce: from n/a through 2.9.14. | 2024-06-11 | 5.4 | CVE-2024-32144 [email protected] |
Woo–WooCommerce Canada Post Shipping | Missing Authorization vulnerability in Woo WooCommerce Canada Post Shipping.This issue affects WooCommerce Canada Post Shipping: from n/a through 2.8.3. | 2024-06-11 | 5.3 | CVE-2023-51498 [email protected] |
Woo–WooCommerce Product Vendors | Missing Authorization vulnerability in Woo WooCommerce Product Vendors.This issue affects WooCommerce Product Vendors: from n/a through 2.2.2. | 2024-06-11 | 5.3 | CVE-2023-52186 [email protected] |
Woo–WooCommerce Ship to Multiple Addresses | Missing Authorization vulnerability in Woo WooCommerce Ship to Multiple Addresses.This issue affects WooCommerce Ship to Multiple Addresses: from n/a through 3.8.9. | 2024-06-14 | 5.4 | CVE-2023-51497 [email protected] |
Woo–WooCommerce Warranty Requests | Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.2.7. | 2024-06-14 | 6.5 | CVE-2023-51495 [email protected] |
Woo–WooCommerce Warranty Requests | Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.2.7. | 2024-06-14 | 5.3 | CVE-2023-51496 [email protected] |
woocommerce–woocommerce | WooCommerce is an open-source e-commerce platform built on WordPress. A vulnerability introduced in WooCommerce 8.8 allows for cross-site scripting. A bad actor can manipulate a link to include malicious HTML & JavaScript content. While the content is not saved to the database, the links may be sent to victims for malicious purposes. The injected JavaScript could hijack content & data stored in the browser, including the session. The URL content is read through the `Sourcebuster.js` library and then inserted without proper sanitization to the classic checkout and registration forms. Versions 8.8.5 and 8.9.3 contain a patch for the issue. As a workaround, one may disable the Order Attribution feature. | 2024-06-12 | 5.4 | CVE-2024-37297 [email protected] [email protected] [email protected] [email protected] |
WP EasyCart–WP EasyCart | Missing Authorization vulnerability in WP EasyCart.This issue affects WP EasyCart: from n/a through 5.5.19. | 2024-06-11 | 5.3 | CVE-2024-35667 [email protected] |
WP OnlineSupport, Essential Plugin–Preloader for Website | Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Preloader for Website.This issue affects Preloader for Website: from n/a through 1.2.2. | 2024-06-11 | 5.3 | CVE-2023-48273 [email protected] |
wpbakery–WPBakery Visual Composer | The WPBakery Visual Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the link attribute within the vc_single_image shortcode in all versions up to, and including, 7.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-13 | 6.4 | CVE-2024-5265 [email protected] [email protected] |
wpdevteam–EmbedPress Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor | The EmbedPress – Embed PDF, YouTube, Google Docs, Vimeo, Wistia Videos, Audios, Maps & Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the PDF Widget URL in all versions up to, and including, 3.9.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-13 | 6.4 | CVE-2024-1565 [email protected] [email protected] [email protected] |
wpdevteam–Essential Addons for Elementor Best Elementor Templates, Widgets, Kits & WooCommerce Builders | The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘custom_js’ parameter in all versions up to, and including, 5.9.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-11 | 6.4 | CVE-2024-5189 [email protected] [email protected] [email protected] |
WPEverest–Everest Forms | Missing Authorization vulnerability in WPEverest Everest Forms.This issue affects Everest Forms: from n/a through 2.0.3. | 2024-06-14 | 5.3 | CVE-2023-51377 [email protected] |
wpgmaps–WP Go Maps (formerly WP Google Maps) | The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Custom JS option in versions up to, and including, 9.0.38. This makes it possible for authenticated attackers that have been explicitly granted permissions by an administrator, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Version 9.0.39 adds a caution to make administrators aware of the possibility for abuse if permissions are granted to lower-level users. | 2024-06-14 | 6.4 | CVE-2024-5994 [email protected] [email protected] [email protected] |
WPManageNinja LLC–Ninja Tables | Missing Authorization vulnerability in WPManageNinja LLC Ninja Tables.This issue affects Ninja Tables: from n/a through 5.0.5. | 2024-06-14 | 5.3 | CVE-2024-23504 [email protected] |
WPManageNinja LLC–Ninja Tables | Missing Authorization vulnerability in WPManageNinja LLC Ninja Tables.This issue affects Ninja Tables: from n/a through 5.0.6. | 2024-06-11 | 4.3 | CVE-2024-23503 [email protected] |
wpmet–ElementsKit Pro | The ElementsKit Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s Motion Text and Table widgets in all versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2024-06-15 | 6.4 | CVE-2024-5263 [email protected] [email protected] |
Wpmet–WP Fundraising Donation and Crowdfunding Platform | Missing Authorization vulnerability in Wpmet WP Fundraising Donation and Crowdfunding Platform.This issue affects WP Fundraising Donation and Crowdfunding Platform: from n/a through 1.6.4. | 2024-06-11 | 5.3 | CVE-2024-34758 [email protected] |
WPWeb–WooCommerce – Social Login | The WooCommerce – Social Login plugin for WordPress is vulnerable to Email Verification in all versions up to, and including, 2.6.2 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification. | 2024-06-15 | 6.5 | CVE-2024-5868 [email protected] [email protected] |
WriterSystem–WooCommerce Easy Duplicate Product | Missing Authorization vulnerability in WriterSystem WooCommerce Easy Duplicate Product.This issue affects WooCommerce Easy Duplicate Product: from n/a through 0.3.0.7. | 2024-06-14 | 4.3 | CVE-2023-51523 [email protected] |
XjSv–Cooked | The Cooked Pro recipe plugin for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the `_recipe_settings[post_title]` parameter in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. A patch is available at commit 8cf88f334ccbf11134080bbb655c66f1cfe77026 and will be part of version 1.8.0. | 2024-06-13 | 5.4 | CVE-2024-37308 [email protected] [email protected] |
xpeedstudio–MetForm Contact Form, Survey, Quiz, & Custom Form Builder for Elementor | The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.8.8 via the ‘handle_file’ function. This can allow unauthenticated attackers to extract sensitive data, such as Personally Identifiable Information, from files uploaded by users. | 2024-06-11 | 5.3 | CVE-2024-4266 [email protected] [email protected] [email protected] |
yithemes — yith_woocommerce_product_add-ons | Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) vulnerability in YITH YITH WooCommerce Product Add-Ons allows Code Injection.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.9.2. | 2024-06-10 | 5.3 | CVE-2024-35680 [email protected] |
Yoast–Yoast SEO Premium | Missing Authorization vulnerability in Yoast Yoast SEO Premium.This issue affects Yoast SEO Premium: from n/a through 20.4. | 2024-06-11 | 5.3 | CVE-2023-28775 [email protected] |
yotuwp–Video Gallery YouTube Playlist, Channel Gallery by YotuWP | The Video Gallery – YouTube Playlist, Channel Gallery by YotuWP plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.13 via the display function. This makes it possible for authenticated attackers, with contributor access and higher, to include and execute arbitrary php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | 2024-06-15 | 6.4 | CVE-2024-4551 [email protected] [email protected] [email protected] |
Low Vulnerabilities
Primary Vendor — Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and affect the integrity of the page. Exploitation of this issue requires user interaction. | 2024-06-13 | 3.5 | CVE-2024-26126 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and affect the integrity of the page. Exploitation of this issue requires user interaction. | 2024-06-13 | 3.5 | CVE-2024-26127 [email protected] |
Adobe–Adobe Experience Manager | Adobe Experience Manager versions 6.5.20 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and affect the integrity of the page. Exploitation of this issue requires user interaction. | 2024-06-13 | 3.5 | CVE-2024-36226 [email protected] |
BeyondTrust–BeyondInsight PasswordSafe | A low severity vulnerability in BIPS has been identified where an attacker with high privileges or a compromised high privilege account can overwrite Read-Only smart rules via a specially crafted API request. | 2024-06-11 | 3.3 | CVE-2024-5812 13061848-ea10-403d-bd75-c83a022c2891 |
Fortinet–FortiProxy | A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file. | 2024-06-11 | 1.8 | CVE-2024-21754 [email protected] |
GitLab–GitLab | DoS in KAS in GitLab CE/EE affecting all versions from 16.10.0 prior to 16.10.6 and 16.11.0 prior to 16.11.3 allows an attacker to crash KAS via crafted gRPC requests. | 2024-06-14 | 3.1 | CVE-2024-5469 [email protected] |
Harbor–Harbor | SQL-Injection in Harbor allows priviledge users to leak the task IDs | 2024-06-11 | 2.7 | CVE-2024-22261 [email protected] |
HashiCorp–Vault | Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected. This vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9 | 2024-06-12 | 2.6 | CVE-2024-5798 [email protected] |
HCL Software–DRYiCE Optibot Reset Station | HCL DRYiCE Optibot Reset Station is impacted by a missing Strict Transport Security Header.  This could allow an attacker to intercept or manipulate data during redirection. | 2024-06-14 | 3.7 | CVE-2024-30119 [email protected] |
HCL Software–DRYiCE Optibot Reset Station | HCL DRYiCE Optibot Reset Station is impacted by an Unused Parameter in the web application. | 2024-06-14 | 2.9 | CVE-2024-30120 [email protected] |
Hitachi Energy–FOXMAN-UN | A vulnerability exists in the FOXMAN-UN/UNEM in which sensitive information is stored in cleartext within a resource that might be accessible to another control sphere. | 2024-06-11 | 1.9 | CVE-2024-28024 [email protected] [email protected] |
IBM–i | IBM Db2 for i 7.2, 7.3, 7.4, and 7.5 supplies user defined table function is vulnerable to user enumeration by a local authenticated attacker, without having authority to the related *USRPRF objects. This can be used by a malicious actor to gather information about users that can be targeted in further attacks. IBM X-Force ID: 287174. | 2024-06-15 | 3.3 | CVE-2024-31870 [email protected] [email protected] |
Mattermost–Mattermost | Mattermost Desktop App versions <=5.7.0 fail to disable certain Electron debug flags which allows for bypassing TCC restrictions on macOS. | 2024-06-14 | 3.8 | CVE-2024-36287 [email protected] |
n/a–playSMS | A vulnerability classified as problematic has been found in playSMS up to 1.4.7. Affected is an unknown function of the file /index.php?app=main&inc=feature_schedule&op=list of the component SMS Schedule Handler. The manipulation of the argument name/message leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.4.8 is able to address this issue. The name of the patch is 7a88920f6b536c6a91512e739bcb4e8adefeed2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-267912. NOTE: The code maintainer was contacted early about this disclosure and was eager to prepare a fix as quickly as possible. | 2024-06-11 | 3.5 | CVE-2024-5851 [email protected] [email protected] [email protected] [email protected] |
nextcloud–security-advisories | Nextcloud Photos is a photo management app. Users can remove photos from the album of registered users. It is recommended that the Nextcloud Server is upgraded to 25.0.7 or 26.0.2 and the Nextcloud Enterprise Server is upgraded to 25.0.7 or 26.0.2. | 2024-06-14 | 3.5 | CVE-2024-37314 [email protected] [email protected] [email protected] |
nextcloud–security-advisories | Nextcloud Server is a self hosted personal cloud system. An attacker with read-only access to a file is able to restore older versions of a document when the files_versions app is enabled. It is recommended that the Nextcloud Server is upgraded to 26.0.12, 27.1.7 or 28.0.3 and that the Nextcloud Enterprise Server is upgraded to 23.0.12.16, 24.0.12.12, 25.0.13.6, 26.0.12, 27.1.7 or 28.0.3. | 2024-06-14 | 3.5 | CVE-2024-37315 [email protected] [email protected] [email protected] |
nextcloud–security-advisories | Nextcloud Server is a self hosted personal cloud system. A malicious user was able to send delete requests for old versions of files they only got shared with read permissions. It is recommended that the Nextcloud Server is upgraded to 26.0.12 or 27.1.7 or 28.0.3 and that the Nextcloud Enterprise Server is upgraded to 26.0.12 or 27.1.7 or 28.0.3. | 2024-06-14 | 3.5 | CVE-2024-37884 [email protected] [email protected] [email protected] |
nextcloud–security-advisories | The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. A code injection in Nextcloud Desktop Client for macOS allowed to load arbitrary code when starting the client with DYLD_INSERT_LIBRARIES set in the enviroment. It is recommended that the Nextcloud Desktop client is upgraded to 3.12.0. | 2024-06-14 | 3.8 | CVE-2024-37885 [email protected] [email protected] [email protected] |
nextcloud–security-advisories | Nextcloud Server is a self hosted personal cloud system. Private shared calendar events’ recurrence exceptions can be read by sharees. It is recommended that the Nextcloud Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1 and that the Nextcloud Enterprise Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1. | 2024-06-14 | 3.5 | CVE-2024-37887 [email protected] [email protected] [email protected] |
Red Hat–Red Hat Build of Keycloak | A Cross-site request forgery (CSRF) flaw was found in Keycloak and occurs due to the lack of a unique token sent during the authentication POST request, /login-actions/authenticate. This flaw allows an attacker to craft a malicious login page and trick a legitimate user of an application into authenticating with an attacker-controlled account instead of their own. | 2024-06-12 | 3.7 | CVE-2024-5203 [email protected] [email protected] |
SAP_SE–SAP BusinessObjects Business Intelligence Platform | On Unix, SAP BusinessObjects Business Intelligence Platform (Scheduling) allows an authenticated attacker with administrator access on the local server to access the password of a local account. As a result, an attacker can obtain non-administrative user credentials, which will allow them to read or modify the remote server files. | 2024-06-11 | 3.7 | CVE-2024-34684 [email protected] [email protected] |
Siemens–TIA Administrator | A vulnerability has been identified in TIA Administrator (All versions < V3 SP2). The affected component creates temporary download files in a directory with insecure permissions. This could allow any authenticated attacker on Windows to disrupt the update process. | 2024-06-11 | 3.3 | CVE-2023-38533 [email protected] |
smallweigit–Avue | A vulnerability classified as problematic was found in smallweigit Avue up to 3.4.4. Affected by this vulnerability is an unknown functionality of the component avueUeditor. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-267895. NOTE: The code maintainer explains, that “rich text is no longer maintained”. | 2024-06-11 | 3.5 | CVE-2024-5829 [email protected] [email protected] [email protected] |
smub–Easy WP SMTP by SendLayer WordPress SMTP and Email Log Plugin | The Easy WP SMTP by SendLayer – WordPress SMTP and Email Log Plugin plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 2.3.0. This is due to plugin providing the SMTP password in the SMTP Password field when viewing the settings. This makes it possible for authenticated attackers, with administrative-level access and above, to view the SMTP password for the supplied server. Although this would not be useful for attackers in most cases, if an administrator account becomes compromised this could be useful information to an attacker in a limited environment. | 2024-06-13 | 2.7 | CVE-2024-3073 [email protected] [email protected] |
strapi–strapi | Strapi is an open-source content management system. Prior to version 4.19.1, a super admin can create a collection where an item in the collection has an association to another collection. When this happens, another user with Author Role can see the list of associated items they did not create. They should see nothing but their own items they created not all items ever created. Users should upgrade @strapi/plugin-content-manager to version 4.19.1 to receive a patch. | 2024-06-12 | 2.3 | CVE-2024-29181 [email protected] [email protected] |
Tenable–Security Center | A stored cross site scripting vulnerability exists in Tenable Security Center where an authenticated, remote attacker could inject HTML code into a web application scan result page. | 2024-06-12 | 3.5 | CVE-2024-1891 [email protected] |
ZKTeco–ZKBio CVSecurity V5000 | A vulnerability was found in ZKTeco ZKBio CVSecurity V5000 4.1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Department Section. The manipulation of the argument Department Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268693 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | 2024-06-15 | 3.5 | CVE-2024-6005 [email protected] [email protected] [email protected] |
ZKTeco–ZKBio CVSecurity V5000 | A vulnerability was found in ZKTeco ZKBio CVSecurity V5000 4.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Summer Schedule Handler. The manipulation of the argument Schedule Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268694 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | 2024-06-15 | 3.5 | CVE-2024-6006 [email protected] [email protected] [email protected] |
Severity Not Yet Assigned
Primary Vendor — Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
Acronis–Acronis Cloud Manager | Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.24135.272. | 2024-06-14 | not yet calculated | CVE-2024-34012 [email protected] |
Apache Software Foundation–Apache Airflow | Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow. Airflow did not return “Cache-Control” header for dynamic content, which in case of some browsers could result in potentially storing sensitive data in local cache of the browser. This issue affects Apache Airflow: before 2.9.2. Users are recommended to upgrade to version 2.9.2, which fixes the issue. | 2024-06-14 | not yet calculated | CVE-2024-25142 [email protected] [email protected] |
Apache Software Foundation–Apache Allura | Import functionality is vulnerable to DNS rebinding attacks between verification and processing of the URL. Project administrators can run these imports, which could cause Allura to read from internal services and expose them. This issue affects Apache Allura from 1.0.1 through 1.16.0. Users are recommended to upgrade to version 1.17.0, which fixes the issue. If you are unable to upgrade, set “disable_entry_points.allura.importers = forge-tracker, forge-discussion” in your .ini config file. | 2024-06-10 | not yet calculated | CVE-2024-36471 [email protected] |
Apple–iOS and iPadOS | An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. An attacker with physical access may be able to leak Mail account credentials. | 2024-06-10 | not yet calculated | CVE-2024-23251 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. A maliciously crafted email may be able to initiate FaceTime calls without user authorization. | 2024-06-10 | not yet calculated | CVE-2024-23282 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8. An unprivileged app may be able to log keystrokes in other apps including those using secure input mode. | 2024-06-10 | not yet calculated | CVE-2024-27799 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing a maliciously crafted message may lead to a denial-of-service. | 2024-06-10 | not yet calculated | CVE-2024-27800 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved checks. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to elevate privileges. | 2024-06-10 | not yet calculated | CVE-2024-27801 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution. | 2024-06-10 | not yet calculated | CVE-2024-27802 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | An issue was addressed with improved validation of environment variables. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to access sensitive user data. | 2024-06-10 | not yet calculated | CVE-2024-27805 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | This issue was addressed with improved environment sanitization. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to access sensitive user data. | 2024-06-10 | not yet calculated | CVE-2024-27806 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. An app may be able to circumvent App Privacy Report logging. | 2024-06-10 | not yet calculated | CVE-2024-27807 [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved memory handling. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing web content may lead to arbitrary code execution. | 2024-06-10 | not yet calculated | CVE-2024-27808 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved checks. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to elevate privileges. | 2024-06-10 | not yet calculated | CVE-2024-27811 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges. | 2024-06-10 | not yet calculated | CVE-2024-27815 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges. | 2024-06-10 | not yet calculated | CVE-2024-27817 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 17.5 and iPadOS 17.5. An attacker with physical access may be able to access contacts from the lock screen. | 2024-06-10 | not yet calculated | CVE-2024-27819 [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved memory handling. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing web content may lead to arbitrary code execution. | 2024-06-10 | not yet calculated | CVE-2024-27820 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved memory handling. This issue is fixed in visionOS 1.2, watchOS 10.5, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to execute arbitrary code with kernel privileges. | 2024-06-10 | not yet calculated | CVE-2024-27828 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | This issue was addressed through improved state management. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user. | 2024-06-10 | not yet calculated | CVE-2024-27830 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. Processing a file may lead to unexpected app termination or arbitrary code execution. | 2024-06-10 | not yet calculated | CVE-2024-27831 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved checks. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to elevate privileges. | 2024-06-10 | not yet calculated | CVE-2024-27832 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5. Processing maliciously crafted web content may lead to arbitrary code execution. | 2024-06-10 | not yet calculated | CVE-2024-27833 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved checks. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, iOS 17.5 and iPadOS 17.5. Processing a maliciously crafted image may lead to arbitrary code execution. | 2024-06-10 | not yet calculated | CVE-2024-27836 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed by adding additional logic. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user. | 2024-06-10 | not yet calculated | CVE-2024-27838 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5. An attacker that has already achieved kernel code execution may be able to bypass kernel memory protections. | 2024-06-10 | not yet calculated | CVE-2024-27840 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | A privacy issue was addressed with improved handling of temporary files. This issue is fixed in iOS 17.5 and iPadOS 17.5. An app may be able to access Notes attachments. | 2024-06-10 | not yet calculated | CVE-2024-27845 [email protected] [email protected] |
Apple–iOS and iPadOS | This issue was addressed with improved permissions checking. This issue is fixed in macOS Sonoma 14.5, iOS 17.5 and iPadOS 17.5. A malicious app may be able to gain root privileges. | 2024-06-10 | not yet calculated | CVE-2024-27848 [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | This issue was addressed with improvements to the noise injection algorithm. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, Safari 17.5, iOS 17.5 and iPadOS 17.5. A maliciously crafted webpage may be able to fingerprint the user. | 2024-06-10 | not yet calculated | CVE-2024-27850 [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved bounds checks. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing maliciously crafted web content may lead to arbitrary code execution. | 2024-06-10 | not yet calculated | CVE-2024-27851 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. A shortcut may be able to use sensitive data with certain actions without prompting the user. | 2024-06-10 | not yet calculated | CVE-2024-27855 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–iOS and iPadOS | An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, tvOS 17.5, iOS 17.5 and iPadOS 17.5. A remote attacker may be able to cause unexpected app termination or arbitrary code execution. | 2024-06-10 | not yet calculated | CVE-2024-27857 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–macOS | The issue was addressed with improved checks. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, Safari 17.5. A website’s permission dialog may persist after navigation away from the site. | 2024-06-10 | not yet calculated | CVE-2024-27844 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–macOS | This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. An app may be able to modify protected parts of the file system. | 2024-06-10 | not yet calculated | CVE-2024-27885 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
Apple–visionOS | The issue was addressed with improvements to the file handling protocol. This issue is fixed in visionOS 1.2. Processing web content may lead to a denial-of-service. | 2024-06-10 | not yet calculated | CVE-2024-27812 [email protected] [email protected] [email protected] |
Apple–watchOS | This issue was addressed through improved state management. This issue is fixed in watchOS 10.5. A person with physical access to a device may be able to view contact information from the lock screen. | 2024-06-10 | not yet calculated | CVE-2024-27814 [email protected] [email protected] |
AVEVA–PI Asset Framework Client | There is a vulnerability in AVEVA PI Asset Framework Client that could allow malicious code to execute on the PI System Explorer environment under the privileges of an interactive user that was socially engineered to import XML supplied by an attacker. | 2024-06-12 | not yet calculated | CVE-2024-3467 [email protected] |
AVEVA–PI Web API | There is a vulnerability in AVEVA PI Web API that could allow malicious code to execute on the PI Web API environment under the privileges of an interactive user that was socially engineered to use API XML import functionality with content supplied by an attacker. | 2024-06-12 | not yet calculated | CVE-2024-3468 [email protected] |
Broadcom–Symantec SiteMinder | A CRLF cross-site scripting vulnerability has been identified in certain configurations of the SiteMinder Web Agent for IIS Web Server and SiteMinder Web Agent for Domino Web Server. As a result, an attacker can execute arbitrary Javascript code in a client browser. | 2024-06-14 | not yet calculated | CVE-2024-36459 [email protected] [email protected] |
Citrix–Citrix Hypervisor | An issue has been identified in both XenServer 8 and Citrix Hypervisor 8.2 CU1 LTSR which may allow a malicious administrator of a guest VM to cause the host to become slow and/or unresponsive. | 2024-06-13 | not yet calculated | CVE-2024-5661 [email protected] |
Cybozu, Inc.–Cybozu Garoon | Improper handling of extra values issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, a user who can log in to the product with the administrative privilege may be able to cause a denial-of-service (DoS) condition. | 2024-06-11 | not yet calculated | CVE-2024-31397 [email protected] [email protected] |
Cybozu, Inc.–Cybozu Garoon | Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, a user who can log in to the product may obtain information on the list of users. | 2024-06-11 | not yet calculated | CVE-2024-31398 [email protected] [email protected] |
Cybozu, Inc.–Cybozu Garoon | Excessive platform resource consumption within a loop issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, processing a crafted mail may cause a denial-of-service (DoS) condition. | 2024-06-11 | not yet calculated | CVE-2024-31399 [email protected] [email protected] |
Cybozu, Inc.–Cybozu Garoon | Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.0.0 to 5.15.0. If this vulnerability is exploited, unintended data may be left in forwarded mail. | 2024-06-11 | not yet calculated | CVE-2024-31400 [email protected] [email protected] |
Cybozu, Inc.–Cybozu Garoon | Cross-site scripting vulnerability in Cybozu Garoon 5.0.0 to 5.15.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script on the web browser of the user who is logging in to the product. | 2024-06-11 | not yet calculated | CVE-2024-31401 [email protected] [email protected] |
Cybozu, Inc.–Cybozu Garoon | Incorrect authorization vulnerability in Cybozu Garoon 5.0.0 to 5.15.2 allows a remote authenticated attacker to delete the data of Shared To-Dos. | 2024-06-11 | not yet calculated | CVE-2024-31402 [email protected] [email protected] |
Cybozu, Inc.–Cybozu Garoon | Incorrect authorization vulnerability in Cybozu Garoon 5.0.0 to 6.0.0 allows a remote authenticated attacker to alter and/or obtain the data of Memo. | 2024-06-11 | not yet calculated | CVE-2024-31403 [email protected] [email protected] |
Cybozu, Inc.–Cybozu Garoon | Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.5.0 to 6.0.0, which may allow a user who can log in to the product to view the data of Scheduler. | 2024-06-11 | not yet calculated | CVE-2024-31404 [email protected] [email protected] |
Deep Sea Electronics–DSE855 | Deep Sea Electronics DSE855 Configuration Backup Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22679. | 2024-06-13 | not yet calculated | CVE-2024-5947 [email protected] |
Deep Sea Electronics–DSE855 | Deep Sea Electronics DSE855 Multipart Boundary Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of multipart boundaries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23170. | 2024-06-13 | not yet calculated | CVE-2024-5948 [email protected] |
Deep Sea Electronics–DSE855 | Deep Sea Electronics DSE855 Multipart Boundary Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of multipart boundaries. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23171. | 2024-06-13 | not yet calculated | CVE-2024-5949 [email protected] |
Deep Sea Electronics–DSE855 | Deep Sea Electronics DSE855 Multipart Value Handling Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of multipart form variables. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23172. | 2024-06-13 | not yet calculated | CVE-2024-5950 [email protected] |
Deep Sea Electronics–DSE855 | Deep Sea Electronics DSE855 Factory Reset Missing Authentication Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23173. | 2024-06-13 | not yet calculated | CVE-2024-5951 [email protected] |
Deep Sea Electronics–DSE855 | Deep Sea Electronics DSE855 Restart Missing Authentication Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23174. | 2024-06-13 | not yet calculated | CVE-2024-5952 [email protected] |
Dropbox–Dropbox Desktop | Dropbox Desktop Folder Sharing Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Dropbox Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of shared folders. When syncing files from a shared folder belonging to an untrusted account, the Dropbox desktop application does not apply the Mark-of-the-Web to the local files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23991. | 2024-06-13 | not yet calculated | CVE-2024-5924 [email protected] |
ELECOM CO.,LTD.–WRC-X5400GS-B | OS command injection vulnerability in WRC-X5400GS-B v1.0.10 and earlier, and WRC-X5400GSA-B v1.0.10 and earlier allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. | 2024-06-12 | not yet calculated | CVE-2024-36103 [email protected] [email protected] |
Fsas Technologies Inc.–IPCOM EX2 Series (V01L0x Series) | Use of uninitialized resource issue exists in IPCOM EX2 Series (V01L0x Series) V01L07NF0201 and earlier, and IPCOM VE2 Series V01L07NF0201 and earlier. If this vulnerability is exploited, the system may be rebooted or suspended by receiving a specially crafted packet. | 2024-06-12 | not yet calculated | CVE-2024-36454 [email protected] [email protected] |
Google–Android | In ProtocolPsDedicatedBearInfoAdapter::processQosSession of protocolpsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-29778 [email protected] |
Google–Android | In hwbcc_ns_deprivilege of trusty/user/base/lib/hwbcc/client/hwbcc.c, there is a possible uninitialized stack data disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-29780 [email protected] |
Google–Android | In ss_AnalyzeOssReturnResUssdArgIe of ss_OssAsnManagement.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-29781 [email protected] |
Google–Android | In prepare_response of lwis_periodic_io.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-29784 [email protected] |
Google–Android | In aur_get_state of aurora.c, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-29785 [email protected] |
Google–Android | In pktproc_fill_data_addr_without_bm of link_rx_pktproc.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-29786 [email protected] |
Google–Android | In lwis_process_transactions_in_queue of lwis_transaction.c, there is a possible use after free due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-29787 [email protected] |
Google–Android | In sec_media_unprotect of media.c, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32891 [email protected] |
Google–Android | In handle_init of goodix/main/main.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32892 [email protected] |
Google–Android | In _s5e9865_mif_set_rate of exynos_dvfs.c, there is a possible out of bounds read due to improper casting. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32893 [email protected] |
Google–Android | In bc_get_converted_received_bearer of bc_utilities.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32894 [email protected] |
Google–Android | In BCMFASTPATH of dhd_msgbuf.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32895 [email protected] |
Google–Android | In ProtocolCdmaCallWaitingIndAdapter::GetCwInfo() of protocolsmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32897 [email protected] |
Google–Android | In ProtocolCellIdentityParserV4::Parse() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32898 [email protected] |
Google–Android | In gpu_pm_power_off_top_nolock of pixel_gpu_power.c, there is a possible compromise of protected memory due to a race condition. This could lead to local escalation of privilege to TEE with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32899 [email protected] |
Google–Android | In lwis_fence_signal of lwis_debug.c, there is a possible Use after Free due to improper locking. This could lead to local escalation of privilege from hal_camera_default SELinux label with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32900 [email protected] |
Google–Android | In v4l2_smfc_qbuf of smfc-v4l2-ioctls.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32901 [email protected] |
Google–Android | Remote prevention of access to cellular service with no user interaction (for example, crashing the cellular radio service with a malformed packet) | 2024-06-13 | not yet calculated | CVE-2024-32902 [email protected] |
Google–Android | In prepare_response_locked of lwis_transaction.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32903 [email protected] |
Google–Android | In ProtocolVsimOperationAdapter() of protocolvsimadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32904 [email protected] |
Google–Android | In circ_read of link_device_memory_legacy.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32905 [email protected] |
Google–Android | In AcvpOnMessage of avcp.cpp, there is a possible EOP due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32906 [email protected] |
Google–Android | In memcall_add of memlog.c, there is a possible buffer overflow due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32907 [email protected] |
Google–Android | In sec_media_protect of media.c, there is a possible permission bypass due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32908 [email protected] |
Google–Android | In handle_msg of main.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32909 [email protected] |
Google–Android | In handle_msg_shm_map_req of trusty/user/base/lib/spi/srv/tipc/tipc.c, there is a possible stack data disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32910 [email protected] |
Google–Android | There is a possible escalation of privilege due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32911 [email protected] |
Google–Android | there is a possible persistent Denial of Service due to test/debugging code left in a production build. This could lead to local denial of service of impaired use of the device with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32912 [email protected] |
Google–Android | In wl_notify_rx_mgmt_frame of wl_cfg80211.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32913 [email protected] |
Google–Android | In tpu_get_int_state of tpu.c, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32914 [email protected] |
Google–Android | In CellInfoListParserV2::FillCellInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32915 [email protected] |
Google–Android | In fvp_freq_histogram_init of fvp.c, there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32916 [email protected] |
Google–Android | In pl330_dma_from_peri_start() of fp_spi_dma.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32917 [email protected] |
Google–Android | Permission Bypass allowing attackers to disable HDCP 2.2 encryption by not completing the HDCP Key Exchange initialization steps | 2024-06-13 | not yet calculated | CVE-2024-32918 [email protected] |
Google–Android | In lwis_add_completion_fence of lwis_fence.c, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32919 [email protected] |
Google–Android | In set_secure_reg of sac_handler.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure of 4 bytes of stack memory with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32920 [email protected] |
Google–Android | In lwis_initialize_transaction_fences of lwis_fence.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32921 [email protected] |
Google–Android | In gpu_pm_power_on_top_nolock of pixel_gpu_power.c, there is a possible compromise of protected memory due to a logic error in the code. This could lead to local escalation of privilege to TEE with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32922 [email protected] |
Google–Android | there is a possible cellular denial of service due to a logic error in the code. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32923 [email protected] |
Google–Android | In DeregAcceptProcINT of cn_NrmmStateDeregInit.cpp, there is a possible denial of service due to a logic error in the code. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32924 [email protected] |
Google–Android | In dhd_prot_txstatus_process of dhd_msgbuf.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32925 [email protected] |
Google–Android | there is a possible information disclosure due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32926 [email protected] |
Google–Android | In gpu_slc_get_region of pixel_gpu_slc.c, there is a possible EoP due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32929 [email protected] |
Google–Android | In plugin_ipc_handler of slc_plugin.c, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure of 4 bytes of stack memory with no additional execution privileges needed. User interaction is not needed for exploitation. | 2024-06-13 | not yet calculated | CVE-2024-32930 [email protected] |
Google–Chrome | Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) | 2024-06-11 | not yet calculated | CVE-2024-5830 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Use after free in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2024-06-11 | not yet calculated | CVE-2024-5831 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Use after free in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2024-06-11 | not yet calculated | CVE-2024-5832 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) | 2024-06-11 | not yet calculated | CVE-2024-5833 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Inappropriate implementation in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) | 2024-06-11 | not yet calculated | CVE-2024-5834 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Heap buffer overflow in Tab Groups in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2024-06-11 | not yet calculated | CVE-2024-5835 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Inappropriate Implementation in DevTools in Google Chrome prior to 126.0.6478.54 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: High) | 2024-06-11 | not yet calculated | CVE-2024-5836 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) | 2024-06-11 | not yet calculated | CVE-2024-5837 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) | 2024-06-11 | not yet calculated | CVE-2024-5838 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Inappropriate Implementation in Memory Allocator in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | 2024-06-11 | not yet calculated | CVE-2024-5839 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Policy bypass in CORS in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Medium) | 2024-06-11 | not yet calculated | CVE-2024-5840 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Use after free in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | 2024-06-11 | not yet calculated | CVE-2024-5841 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Use after free in Browser UI in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium) | 2024-06-11 | not yet calculated | CVE-2024-5842 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Inappropriate implementation in Downloads in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to obfuscate security UI via a malicious file. (Chromium security severity: Medium) | 2024-06-11 | not yet calculated | CVE-2024-5843 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Heap buffer overflow in Tab Strip in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium) | 2024-06-11 | not yet calculated | CVE-2024-5844 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Use after free in Audio in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) | 2024-06-11 | not yet calculated | CVE-2024-5845 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Use after free in PDFium in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) | 2024-06-11 | not yet calculated | CVE-2024-5846 [email protected] [email protected] [email protected] [email protected] |
Google–Chrome | Use after free in PDFium in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) | 2024-06-11 | not yet calculated | CVE-2024-5847 [email protected] [email protected] [email protected] [email protected] |
Hewlett Packard Enterprise (HPE)–Cray System Management Software – PALS | HPE Cray Parallel Application Launch Service (PALS) is subject to an authentication bypass. | 2024-06-13 | not yet calculated | CVE-2024-22441 [email protected] |
Hitachi Energy–FOX61x | If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible | 2024-06-11 | not yet calculated | CVE-2024-2461 [email protected] |
Hitachi Energy–FOXMAN-UN | Allow attackers to intercept or falsify data exchanges between the client and the server | 2024-06-11 | not yet calculated | CVE-2024-2462 [email protected] |
HP Inc.–HP Advance Mobile Application | HP Advance Mobile Applications for iOS and Android are potentially vulnerable to information disclosure when using an outdated version of the application via mobile devices. | 2024-06-12 | not yet calculated | CVE-2024-2300 [email protected] |
HP Inc.–HP PC products | Potential vulnerabilities have been identified in the system BIOS for certain HP PC products which may allow escalation of privileges and code execution. HP is releasing firmware updates to mitigate the potential vulnerabilities. | 2024-06-10 | not yet calculated | CVE-2022-37019 [email protected] |
HP Inc.–HP PC products | Potential vulnerabilities have been identified in the system BIOS for certain HP PC products, which might allow escalation of privileges and code execution. HP is releasing firmware updates to mitigate the potential vulnerabilities. | 2024-06-10 | not yet calculated | CVE-2022-37020 [email protected] |
Jan Syski–MegaBIP | SQL Injection vulnerability in MegaBIP software allows attacker to obtain site administrator privileges, including access to the administration panel and the ability to change the administrator password. This issue affects MegaBIP software versions through 5.09. | 2024-06-12 | not yet calculated | CVE-2024-1576 [email protected] [email protected] [email protected] [email protected] |
Jan Syski–MegaBIP | Remote Code Execution vulnerability in MegaBIP software allows to execute arbitrary code on the server without requiring authentication by saving crafted by the attacker PHP code to one of the website files. This issue affects all versions of MegaBIP software. | 2024-06-12 | not yet calculated | CVE-2024-1577 [email protected] [email protected] [email protected] [email protected] |
Jan Syski–MegaBIP | Arbitrary File Upload vulnerability in MegaBIP software allows attacker to upload any file to the server (including a PHP code file) without an authentication. This issue affects MegaBIP software versions through 5.10. | 2024-06-12 | not yet calculated | CVE-2024-1659 [email protected] [email protected] [email protected] [email protected] |
Keisuke Nakayama–awkblog | OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product. | 2024-06-11 | not yet calculated | CVE-2024-36360 [email protected] [email protected] |
Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: af_unix: Update unix_sk(sk)->oob_skb under sk_receive_queue lock. Billy Jheng Bing-Jhong reported a race between __unix_gc() and queue_oob(). __unix_gc() tries to garbage-collect close()d inflight sockets, and then if the socket has MSG_OOB in unix_sk(sk)->oob_skb, GC will drop the reference and set NULL to it locklessly. However, the peer socket still can send MSG_OOB message and queue_oob() can update unix_sk(sk)->oob_skb concurrently, leading NULL pointer dereference. [0] To fix the issue, let’s update unix_sk(sk)->oob_skb under the sk_receive_queue’s lock and take it everywhere we touch oob_skb. Note that we defer kfree_skb() in manage_oob() to silence lockdep false-positive (See [1]). [0]: BUG: kernel NULL pointer dereference, address: 0000000000000008 PF: supervisor write access in kernel mode PF: error_code(0x0002) – not-present page PGD 8000000009f5e067 P4D 8000000009f5e067 PUD 9f5d067 PMD 0 Oops: 0002 [#1] PREEMPT SMP PTI CPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc5-00191-gd091e579b864 #110 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 Workqueue: events delayed_fput RIP: 0010:skb_dequeue (./include/linux/skbuff.h:2386 ./include/linux/skbuff.h:2402 net/core/skbuff.c:3847) Code: 39 e3 74 3e 8b 43 10 48 89 ef 83 e8 01 89 43 10 49 8b 44 24 08 49 c7 44 24 08 00 00 00 00 49 8b 14 24 49 c7 04 24 00 00 00 00 <48> 89 42 08 48 89 10 e8 e7 c5 42 00 4c 89 e0 5b 5d 41 5c c3 cc cc RSP: 0018:ffffc900001bfd48 EFLAGS: 00000002 RAX: 0000000000000000 RBX: ffff8880088f5ae8 RCX: 00000000361289f9 RDX: 0000000000000000 RSI: 0000000000000206 RDI: ffff8880088f5b00 RBP: ffff8880088f5b00 R08: 0000000000080000 R09: 0000000000000001 R10: 0000000000000003 R11: 0000000000000001 R12: ffff8880056b6a00 R13: ffff8880088f5280 R14: 0000000000000001 R15: ffff8880088f5a80 FS: 0000000000000000(0000) GS:ffff88807dd80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000008 CR3: 0000000006314000 CR4: 00000000007506f0 PKRU: 55555554 Call Trace: <TASK> unix_release_sock (net/unix/af_unix.c:654) unix_release (net/unix/af_unix.c:1050) __sock_release (net/socket.c:660) sock_close (net/socket.c:1423) __fput (fs/file_table.c:423) delayed_fput (fs/file_table.c:444 (discriminator 3)) process_one_work (kernel/workqueue.c:3259) worker_thread (kernel/workqueue.c:3329 kernel/workqueue.c:3416) kthread (kernel/kthread.c:388) ret_from_fork (arch/x86/kernel/process.c:153) ret_from_fork_asm (arch/x86/entry/entry_64.S:257) </TASK> Modules linked in: CR2: 0000000000000008 | 2024-06-10 | not yet calculated | CVE-2024-36972 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
mintplex-labs–mintplex-labs/anything-llm | A path traversal vulnerability in mintplex-labs/anything-llm allowed a manager to bypass the `normalizePath()` function, intended to defend against path traversal attacks. This vulnerability enables the manager to read, delete, or overwrite the ‘anythingllm.db’ database file and other files stored in the ‘storage’ directory, such as internal communication keys and .env secrets. Exploitation of this vulnerability could lead to application compromise, denial of service (DoS) attacks, and unauthorized admin account takeover. The issue stems from improper validation of user-supplied input in the process of setting a custom logo for the app, which can be manipulated to achieve arbitrary file read, deletion, or overwrite, and to execute a DoS attack by deleting critical files required for the application’s operation. | 2024-06-12 | not yet calculated | CVE-2024-5211 [email protected] [email protected] |
Motorola Solutions–Vigilant Fixed LPR Coms Box (BCAV1F2-C600) | The affected product is vulnerable to an attacker modifying the bootloader by using custom arguments to bypass authentication and gain access to the file system and obtain password hashes. | 2024-06-13 | not yet calculated | CVE-2024-38279 [email protected] |
Motorola Solutions–Vigilant Fixed LPR Coms Box (BCAV1F2-C600) | An unauthorized user is able to gain access to sensitive data, including credentials, by physically retrieving the hard disk of the product as the data is stored in clear text. | 2024-06-13 | not yet calculated | CVE-2024-38280 [email protected] |
Motorola Solutions–Vigilant Fixed LPR Coms Box (BCAV1F2-C600) | An attacker can access the maintenance console using hard coded credentials for a hidden wireless network on the device. | 2024-06-13 | not yet calculated | CVE-2024-38281 [email protected] |
Motorola Solutions–Vigilant Fixed LPR Coms Box (BCAV1F2-C600) | Utilizing default credentials, an attacker is able to log into the camera’s operating system which could allow changes to be made to the operations or shutdown the camera requiring a physical reboot of the system. | 2024-06-13 | not yet calculated | CVE-2024-38282 [email protected] |
Motorola Solutions–Vigilant Fixed LPR Coms Box (BCAV1F2-C600) | Sensitive customer information is stored in the device without encryption. | 2024-06-13 | not yet calculated | CVE-2024-38283 [email protected] |
Motorola Solutions–Vigilant Fixed LPR Coms Box (BCAV1F2-C600) | Transmitted data is logged between the device and the backend service. An attacker could use these logs to perform a replay attack to replicate calls. | 2024-06-13 | not yet calculated | CVE-2024-38284 [email protected] |
Motorola Solutions–Vigilant Fixed LPR Coms Box (BCAV1F2-C600) | Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools. | 2024-06-13 | not yet calculated | CVE-2024-38285 [email protected] |
Mozilla–Firefox | If a specific sequence of actions is performed when opening a new tab, the triggering principal associated with the new tab may have been incorrect. The triggering principal is used to calculate many values, including the `Referer` and `Sec-*` headers, meaning there is the potential for incorrect security checks within the browser in addition to incorrect or misleading information sent to remote websites. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 127. | 2024-06-11 | not yet calculated | CVE-2024-5687 [email protected] [email protected] |
Mozilla–Firefox | If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12. | 2024-06-11 | not yet calculated | CVE-2024-5688 [email protected] [email protected] [email protected] [email protected] [email protected] |
Mozilla–Firefox | In addition to detecting when a user was taking a screenshot (XXX), a website was able to overlay the ‘My Shots’ button that appeared, and direct the user to a replica Firefox Screenshots page that could be used for phishing. This vulnerability affects Firefox < 127. | 2024-06-11 | not yet calculated | CVE-2024-5689 [email protected] [email protected] |
Mozilla–Firefox | By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user’s system. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12. | 2024-06-11 | not yet calculated | CVE-2024-5690 [email protected] [email protected] [email protected] [email protected] [email protected] |
Mozilla–Firefox | By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12. | 2024-06-11 | not yet calculated | CVE-2024-5691 [email protected] [email protected] [email protected] [email protected] [email protected] |
Mozilla–Firefox | On Windows 10, when using the ‘Save As’ functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12. | 2024-06-11 | not yet calculated | CVE-2024-5692 [email protected] [email protected] [email protected] [email protected] |
Mozilla–Firefox | Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12. | 2024-06-11 | not yet calculated | CVE-2024-5693 [email protected] [email protected] [email protected] [email protected] [email protected] |
Mozilla–Firefox | An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap. This vulnerability affects Firefox < 127. | 2024-06-11 | not yet calculated | CVE-2024-5694 [email protected] [email protected] |
Mozilla–Firefox | If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could have occurred. This vulnerability affects Firefox < 127. | 2024-06-11 | not yet calculated | CVE-2024-5695 [email protected] [email protected] |
Mozilla–Firefox | By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12. | 2024-06-11 | not yet calculated | CVE-2024-5696 [email protected] [email protected] [email protected] [email protected] [email protected] |
Mozilla–Firefox | A website was able to detect when a user took a screenshot of a page using the built-in Screenshot functionality in Firefox. This vulnerability affects Firefox < 127. | 2024-06-11 | not yet calculated | CVE-2024-5697 [email protected] [email protected] |
Mozilla–Firefox | By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 127. | 2024-06-11 | not yet calculated | CVE-2024-5698 [email protected] [email protected] |
Mozilla–Firefox | In violation of spec, cookie prefixes such as `__Secure` were being ignored if they were not correctly capitalized – by spec they should be checked with a case-insensitive comparison. This could have resulted in the browser not correctly honoring the behaviors specified by the prefix. This vulnerability affects Firefox < 127. | 2024-06-11 | not yet calculated | CVE-2024-5699 [email protected] [email protected] |
Mozilla–Firefox | Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12. | 2024-06-11 | not yet calculated | CVE-2024-5700 [email protected] [email protected] [email protected] [email protected] [email protected] |
Mozilla–Firefox | Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127. | 2024-06-11 | not yet calculated | CVE-2024-5701 [email protected] [email protected] |
Mozilla–Firefox | Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12. | 2024-06-11 | not yet calculated | CVE-2024-5702 [email protected] [email protected] [email protected] [email protected] [email protected] |
Mozilla–Firefox for iOS | When browsing private tabs, some data related to location history or webpage thumbnails could be persisted incorrectly within the sandboxed app bundle after app termination This vulnerability affects Firefox for iOS < 127. | 2024-06-13 | not yet calculated | CVE-2024-38312 [email protected] [email protected] |
Mozilla–Firefox for iOS | In certain scenarios a malicious website could attempt to display a fake location URL bar which could mislead users as to the actual website address This vulnerability affects Firefox for iOS < 127. | 2024-06-13 | not yet calculated | CVE-2024-38313 [email protected] [email protected] |
n/a–n/a | An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Bypass of Two-Factor Authentication can occur under the /login/backup_code endpoint and the /api/v1/vdeskintegration/createbackupcodes endpoint, because the application allows a user to generate or regenerate the backup codes before checking the TOTP. | 2024-06-10 | not yet calculated | CVE-2022-45168 [email protected] |
n/a–n/a | An issue was discovered in LIVEBOX Collaboration vDesk through v018. Stored Cross-site Scripting (XSS) can occur under the /api/v1/getbodyfile endpoint via the uri parameter. The web application (through its vShare functionality section) doesn’t properly check parameters, sent in HTTP requests as input, before saving them on the server. In addition, crafted JavaScript content can then be reflected back to the end user and executed by the web browser. | 2024-06-10 | not yet calculated | CVE-2022-45176 [email protected] |
n/a–n/a | XPath Injection vulnerabilities in the blog and RSS functions of Modern Campus – Omni CMS 2023.1 allow a remote, unauthenticated attacker to obtain application information. | 2024-06-13 | not yet calculated | CVE-2023-35858 [email protected] |
n/a–n/a | A Reflected Cross-Site Scripting (XSS) vulnerability in the blog function of Modern Campus – Omni CMS 2023.1 allows a remote attacker to inject arbitrary scripts or HTML via multiple parameters. | 2024-06-13 | not yet calculated | CVE-2023-35859 [email protected] |
n/a–n/a | A Directory Traversal vulnerability in Modern Campus – Omni CMS 2023.1 allows a remote, unauthenticated attacker to enumerate file system information via the dir parameter to listing.php or rss.php. | 2024-06-13 | not yet calculated | CVE-2023-35860 [email protected] |
n/a–n/a | An issue in vektah gqlparser open-source-library v.2.5.10 allows a remote attacker to cause a denial of service via a crafted script to the parserDirectives function. | 2024-06-12 | not yet calculated | CVE-2023-49559 [email protected] |
n/a–n/a | NTFS-3G before 75dcdc2 has a use-after-free in ntfs_uppercase_mbs in libntfs-3g/unistr.c. NOTE: discussion suggests that exploitation would be challenging. | 2024-06-13 | not yet calculated | CVE-2023-52890 [email protected] |
n/a–n/a | A cross-site scripting (XSS) vulnerability in the User Maintenance section of ITSS iMLog v1.307 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Last Name parameter. | 2024-06-12 | not yet calculated | CVE-2024-22855 [email protected] |
n/a–n/a | Improper input validation of printing files in Monoprice Select Mini V2 V37.115.32 allows attackers to instruct the device’s movable parts to destinations that exceed the devices’ maximum coordinates via the printing of a malicious .gcode file. | 2024-06-12 | not yet calculated | CVE-2024-24051 [email protected] |
n/a–n/a | Directory Traversal vulnerability in Mgt-commerce CloudPanel v.2.0.0 thru v.2.4.0 allows a remote attacker to obtain sensitive information and execute arbitrary code via the service parameter of the load-logfiles function. | 2024-06-14 | not yet calculated | CVE-2024-24320 [email protected] |
n/a–n/a | An issue was discovered in Kape CyberGhostVPN 8.4.3.12823 on Windows. After a successful logout, user credentials remain in memory while the process is still open, and can be obtained by dumping the process memory and parsing it. | 2024-06-11 | not yet calculated | CVE-2024-26330 [email protected] [email protected] |
n/a–n/a | An issue in FinalWire AIRDA Extreme, AIDA64 Engineer, AIDA64 Business, AIDA64 Network Audit v.7.00.6700 and before allows a local attacker to escalate privileges via the DeviceIoControl call associated with MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages components. | 2024-06-10 | not yet calculated | CVE-2024-26507 [email protected] |
n/a–n/a | BOSSCMS v3.10 is vulnerable to Cross Site Request Forgery (CSRF) in name=”head_code” or name=”foot_code.” | 2024-06-10 | not yet calculated | CVE-2024-31613 [email protected] |
n/a–n/a | File Upload vulnerability in openeclass v.3.15 and before allows an attacker to execute arbitrary code via a crafted file to the certbadge.php endpoint. | 2024-06-13 | not yet calculated | CVE-2024-31777 [email protected] |
n/a–n/a | Cross-site scripting (XSS) vulnerability in GUnet OpenEclass E-learning Platform version 3.15 and before allows a authenticated privileged attacker to execute arbitrary code via the title and description fields of the badge template editing function. | 2024-06-13 | not yet calculated | CVE-2024-33253 [email protected] |
n/a–n/a | An issue in the LB-LINK BL-W1210M v2.0 router allows attackers to bypass password complexity requirements and set single digit passwords for authentication. This vulnerability can allow attackers to access the router via a brute-force attack. | 2024-06-14 | not yet calculated | CVE-2024-33373 [email protected] |
n/a–n/a | Incorrect access control in the UART/Serial interface on the LB-LINK BL-W1210M v2.0 router allows attackers to access the root terminal without authentication. | 2024-06-14 | not yet calculated | CVE-2024-33374 [email protected] |
n/a–n/a | LB-LINK BL-W1210M v2.0 was discovered to store user credentials in plaintext within the router’s firmware. | 2024-06-14 | not yet calculated | CVE-2024-33375 [email protected] |
n/a–n/a | LB-LINK BL-W1210M v2.0 was discovered to contain a clickjacking vulnerability via the Administrator login page. Attackers can cause victim users to perform arbitrary operations via interaction with crafted elements on the web page. | 2024-06-14 | not yet calculated | CVE-2024-33377 [email protected] |
n/a–n/a | Pexip Infinity before 34.1 has Improper Access Control for persons in a waiting room. They can see the conference roster list, and perform certain actions that should not be allowed before they are admitted to the meeting. | 2024-06-10 | not yet calculated | CVE-2024-33850 [email protected] |
n/a–n/a | An issue in SiSoftware SANDRA v31.66 (SANDRA.sys 15.18.1.1) and before allows an attacker to escalate privileges via a crafted buffer sent to the Kernel Driver using the DeviceIoControl Windows API. | 2024-06-10 | not yet calculated | CVE-2024-34332 [email protected] |
n/a–n/a | Improper deep link validation in McAfee Security: Antivirus VPN for Android before 8.3.0 could allow an attacker to launch an arbitrary URL within the app. | 2024-06-11 | not yet calculated | CVE-2024-34405 [email protected] [email protected] |
n/a–n/a | Improper exception handling in McAfee Security: Antivirus VPN for Android before 8.3.0 could allow an attacker to cause a denial of service through the use of a malformed deep link. | 2024-06-11 | not yet calculated | CVE-2024-34406 [email protected] [email protected] |
n/a–n/a | Hardcoded credentials in TerraMaster TOS firmware through 5.1 allow a remote attacker to successfully login to the mail or webmail server. These credentials can also be used to login to the administration panel and to perform privileged actions. | 2024-06-14 | not yet calculated | CVE-2024-34539 [email protected] |
n/a–n/a | A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free. | 2024-06-13 | not yet calculated | CVE-2024-35325 [email protected] |
n/a–n/a | libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free. | 2024-06-13 | not yet calculated | CVE-2024-35326 [email protected] |
n/a–n/a | libyaml v0.2.5 is vulnerable to DDOS. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c. | 2024-06-13 | not yet calculated | CVE-2024-35328 [email protected] |
n/a–n/a | libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions. | 2024-06-11 | not yet calculated | CVE-2024-35329 [email protected] [email protected] |
n/a–n/a | An access control issue in Wvp GB28181 Pro 2.0 allows users to continue to access information in the application after deleting their own or administrator accounts. This is provided that the users do not log out of their deleted accounts. | 2024-06-12 | not yet calculated | CVE-2024-36523 [email protected] |
n/a–n/a | nukeviet v.4.5 and before and nukeviet-egov v.1.2.02 and before have a Deserialization vulnerability which results in code execution via /admin/extensions/download.php and /admin/extensions/upload.php. | 2024-06-10 | not yet calculated | CVE-2024-36528 [email protected] |
n/a–n/a | nukeviet v.4.5 and before and nukeviet-egov v.1.2.02 and before are vulnerable to arbitrary code execution via the /admin/extensions/upload.php component. | 2024-06-10 | not yet calculated | CVE-2024-36531 [email protected] |
n/a–n/a | An issue in AdGuardHome v0.93 to latest allows unprivileged attackers to escalate privileges via overwriting the AdGuardHome binary. | 2024-06-13 | not yet calculated | CVE-2024-36586 [email protected] |
n/a–n/a | Insecure permissions in DNSCrypt-proxy v2.0.0alpha9 to v2.1.5 allows non-privileged attackers to escalate privileges to root via overwriting the binary dnscrypt-proxy. | 2024-06-13 | not yet calculated | CVE-2024-36587 [email protected] |
n/a–n/a | An issue in Annonshop.app DecentralizeJustice/ anonymousLocker commit 2b2b4 allows attackers to send messages erroneously attributed to arbitrary users via a crafted HTTP request. | 2024-06-13 | not yet calculated | CVE-2024-36588 [email protected] |
n/a–n/a | An issue in Annonshop.app DecentralizeJustice/anonymousLocker commit 2b2b4 to ba9fd and DecentralizeJustice/anonBackend commit 57837 to cd815 was discovered to store credentials in plaintext. | 2024-06-13 | not yet calculated | CVE-2024-36589 [email protected] |
n/a–n/a | Aegon Life v1.0 was discovered to contain a SQL injection vulnerability via the client_id parameter at clientStatus.php. | 2024-06-14 | not yet calculated | CVE-2024-36597 [email protected] |
n/a–n/a | An arbitrary file upload vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary code via uploading a crafted image file. | 2024-06-14 | not yet calculated | CVE-2024-36598 [email protected] |
n/a–n/a | A cross-site scripting (XSS) vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter at insertClient.php. | 2024-06-14 | not yet calculated | CVE-2024-36599 [email protected] |
n/a–n/a | Buffer Overflow Vulnerability in libcdio v2.1.0 allows an attacker to execute arbitrary code via a crafted ISO 9660 image file. | 2024-06-14 | not yet calculated | CVE-2024-36600 [email protected] |
n/a–n/a | A stored cross-site scripting (XSS) vulnerability in Church CRM v5.8.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Family Name parameter under the Register a New Family page. | 2024-06-13 | not yet calculated | CVE-2024-36647 [email protected] |
n/a–n/a | TOTOLINK AC1200 Wireless Dual Band Gigabit Router firmware A3100R V4.1.2cu.5247_B20211129, in the cgi function `setNoticeCfg` of the file `/lib/cste_modules/system.so`, the length of the user input string `NoticeUrl` is not checked. This can lead to a buffer overflow, allowing attackers to construct malicious HTTP or MQTT requests to cause a denial-of-service attack. | 2024-06-11 | not yet calculated | CVE-2024-36650 [email protected] |
n/a–n/a | In MintHCM 4.0.3, a registered user can execute arbitrary JavaScript code and achieve a reflected Cross-site Scripting (XSS) attack. | 2024-06-14 | not yet calculated | CVE-2024-36656 [email protected] |
n/a–n/a | Insecure permissions in the AdminController.AjaxSave() method of PPGo_Jobs v2.8.0 allows authenticated attackers to arbitrarily modify users’ account information. | 2024-06-12 | not yet calculated | CVE-2024-36691 [email protected] |
n/a–n/a | libiec61850 v1.5 was discovered to contain a heap overflow via the BerEncoder_encodeLength function at /asn1/ber_encoder.c. | 2024-06-11 | not yet calculated | CVE-2024-36702 [email protected] [email protected] [email protected] |
n/a–n/a | A stack overflow vulnerability was found in version 1.18.0 of rhai. The flaw position is: (/ SRC/rhai/SRC/eval/STMT. Rs in rhai: : eval: : STMT: : _ $LT $impl $u20 $rhai.. engine.. Engine$GT$::eval_stmt::h3f1d68ce37fc6e96). Due to the stack overflow is a recursive call/SRC/rhai/SRC/eval/STMT. Rs file eval_stmt_block function. | 2024-06-13 | not yet calculated | CVE-2024-36760 [email protected] |
n/a–n/a | naga v0.14.0 was discovered to contain a stack overflow via the component /wgsl/parse/mod.rs. | 2024-06-12 | not yet calculated | CVE-2024-36761 [email protected] [email protected] |
n/a–n/a | Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root via a directory traversal. | 2024-06-11 | not yet calculated | CVE-2024-36821 [email protected] [email protected] |
n/a–n/a | SQL Injection vulnerability in Boelter Blue System Management v.1.3 allows a remote attacker to execute arbitrary code and obtain sensitive information via the id parameter to news_details.php and location_details.php; and the section parameter to services.php. | 2024-06-12 | not yet calculated | CVE-2024-36840 [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] |
n/a–n/a | RMQTT Broker 0.4.0 allows remote attackers to cause a Denial of Service (daemon crash) via a certain sequence of five TCP packets. | 2024-06-12 | not yet calculated | CVE-2024-36856 [email protected] [email protected] |
n/a–n/a | SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function. | 2024-06-12 | not yet calculated | CVE-2024-37629 [email protected] [email protected] |
n/a–n/a | D-Link DIR-605L v2.13B01 was discovered to contain a hardcoded password vulnerability in /etc/passwd, which allows attackers to log in as root. | 2024-06-13 | not yet calculated | CVE-2024-37630 [email protected] |
n/a–n/a | TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via the File parameter in function UploadCustomModule. | 2024-06-13 | not yet calculated | CVE-2024-37631 [email protected] |
n/a–n/a | TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via the password parameter in function loginAuth . | 2024-06-13 | not yet calculated | CVE-2024-37632 [email protected] |
n/a–n/a | TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiGuestCfg | 2024-06-13 | not yet calculated | CVE-2024-37633 [email protected] |
n/a–n/a | TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiEasyCfg. | 2024-06-13 | not yet calculated | CVE-2024-37634 [email protected] |
n/a–n/a | TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiBasicCfg | 2024-06-13 | not yet calculated | CVE-2024-37635 [email protected] |
n/a–n/a | TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid5g in the function setWizardCfg. | 2024-06-14 | not yet calculated | CVE-2024-37637 [email protected] |
n/a–n/a | TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via eport in the function setIpPortFilterRules. | 2024-06-14 | not yet calculated | CVE-2024-37639 [email protected] |
n/a–n/a | TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid5g in the function setWiFiEasyGuestCfg. | 2024-06-14 | not yet calculated | CVE-2024-37640 [email protected] |
n/a–n/a | TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow via the submit-url parameter at /formNewSchedule | 2024-06-14 | not yet calculated | CVE-2024-37641 [email protected] |
n/a–n/a | TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a command injection vulnerability via the ipv4_ping, ipv6_ping parameter at /formSystemCheck . | 2024-06-14 | not yet calculated | CVE-2024-37642 [email protected] |
n/a–n/a | TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow vulnerability via the submit-url parameter at /formPasswordAuth . | 2024-06-14 | not yet calculated | CVE-2024-37643 [email protected] |
n/a–n/a | TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a hardcoded password vulnerability in /etc/shadow.sample, which allows attackers to log in as root. | 2024-06-14 | not yet calculated | CVE-2024-37644 [email protected] |
n/a–n/a | TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow vulnerability via the submit-url parameter at /formSysLog . | 2024-06-14 | not yet calculated | CVE-2024-37645 [email protected] |
n/a–n/a | An access control issue in Wvp GB28181 Pro 2.0 allows authenticated attackers to escalate privileges to Administrator via a crafted POST request. | 2024-06-12 | not yet calculated | CVE-2024-37665 [email protected] [email protected] |
n/a–n/a | Itsourcecode Payroll Management System 1.0 is vulnerable to SQL Injection in payroll_items.php via the ID parameter. | 2024-06-14 | not yet calculated | CVE-2024-37831 [email protected] |
n/a–n/a | A SQL Injection vulnerability in itsourcecode Billing System 1.0 allows a local attacker to execute arbitrary code in process.php via the username parameter. | 2024-06-13 | not yet calculated | CVE-2024-37849 [email protected] |
n/a–n/a | UERANSIM before 3.2.6 allows out-of-bounds read when a RLS packet is sent to gNodeB with malformed PDU length. This occurs in function readOctetString in src/utils/octet_view.cpp and in function DecodeRlsMessage in src/lib/rls/rls_pdu.cpp | 2024-06-13 | not yet calculated | CVE-2024-37877 [email protected] |
n/a–n/a | Cross Site Scripting vulnerability in TWCMS v.2.0.3 allows a remote attacker to execute arbitrary code via the /TWCMS-gh-pages/twcms/runtime/twcms_view/default,index.htm.php” PHP directly echoes parameters input from external sources | 2024-06-12 | not yet calculated | CVE-2024-37878 [email protected] |
n/a–n/a | ALCASAR before 3.6.1 allows CSRF and remote code execution in activity.php. | 2024-06-13 | not yet calculated | CVE-2024-38293 [email protected] [email protected] |
n/a–n/a | ALCASAR before 3.6.1 allows email_registration_back.php remote code execution. | 2024-06-13 | not yet calculated | CVE-2024-38294 [email protected] [email protected] |
n/a–n/a | ALCASAR before 3.6.1 allows still_connected.php remote code execution. | 2024-06-13 | not yet calculated | CVE-2024-38295 [email protected] [email protected] |
Palo Alto Networks–Cortex XDR Agent | A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability. | 2024-06-12 | not yet calculated | CVE-2024-5905 [email protected] |
Palo Alto Networks–Cortex XDR Agent | A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit. | 2024-06-12 | not yet calculated | CVE-2024-5907 [email protected] |
Palo Alto Networks–Cortex XDR Agent | A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity. | 2024-06-12 | not yet calculated | CVE-2024-5909 [email protected] |
Palo Alto Networks–GlobalProtect App | A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs. | 2024-06-12 | not yet calculated | CVE-2024-5908 [email protected] |
Palo Alto Networks–Prisma Cloud Compute | A cross-site scripting (XSS) vulnerability in Palo Alto Networks Prisma Cloud Compute software enables a malicious administrator with add/edit permissions for identity providers to store a JavaScript payload using the web interface on Prisma Cloud Compute. This enables a malicious administrator to perform actions in the context of another user’s browser when accessed by that other user. | 2024-06-12 | not yet calculated | CVE-2024-5906 [email protected] |
Pandora FMS–Pandora FMS | System command injection through Netflow function due to improper input validation, allowing attackers to execute arbitrary system commands. This issue affects Pandora FMS: from 700 through <777. | 2024-06-10 | not yet calculated | CVE-2024-35304 [email protected] |
Pandora FMS–Pandora FMS | Unauth Time-Based SQL Injection in API allows to exploit HTTP request Authorization header. This issue affects Pandora FMS: from 700 through <777. | 2024-06-10 | not yet calculated | CVE-2024-35305 [email protected] |
Pandora FMS–Pandora FMS | OS Command injection in Ajax PHP files via HTTP Request, allows to execute system commands by exploiting variables. This issue affects Pandora FMS: from 700 through <777. | 2024-06-10 | not yet calculated | CVE-2024-35306 [email protected] |
Pandora FMS–Pandora FMS | Argument Injection Leading to Remote Code Execution in Realtime Graph Extension, allowing unauthenticated attackers to execute arbitrary code on the server. This issue affects Pandora FMS: from 700 through <777. | 2024-06-10 | not yet calculated | CVE-2024-35307 [email protected] |
parisneo–parisneo/lollms | parisneo/lollms version 9.5 is vulnerable to Local File Inclusion (LFI) attacks due to insufficient path sanitization. The `sanitize_path_from_endpoint` function fails to properly sanitize Windows-style paths (backward slash `\`), allowing attackers to perform directory traversal attacks on Windows systems. This vulnerability can be exploited through various routes, including `personalities` and `/del_preset`, to read or delete any file on the Windows filesystem, compromising the system’s availability. | 2024-06-12 | not yet calculated | CVE-2024-4315 [email protected] [email protected] |
parisneo–parisneo/lollms-webui | A Cross-Site Request Forgery (CSRF) vulnerability exists in the restart_program function of the parisneo/lollms-webui v9.6. This vulnerability allows attackers to trick users into performing unintended actions, such as resetting the program without their knowledge, by sending specially crafted CSRF forms. This issue affects the installation process, including the installation of Binding zoo and Models zoo, by unexpectedly resetting programs. The vulnerability is due to the lack of CSRF protection in the affected function. | 2024-06-10 | not yet calculated | CVE-2024-4403 [email protected] |
Rockwell Automation–ControlLogix 5580 | Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised. | 2024-06-14 | not yet calculated | CVE-2024-5659 [email protected] |
Rockwell Automation–FactoryTalk View SE | A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE v12. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. This action is allowed without proper authentication verification. | 2024-06-14 | not yet calculated | CVE-2024-37367 [email protected] |
Rockwell Automation–FactoryTalk View SE | A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. Due to the lack of proper authentication, this action is allowed without proper authentication verification. | 2024-06-14 | not yet calculated | CVE-2024-37368 [email protected] |
Rockwell Automation–FactoryTalk View SE | A privilege escalation vulnerability exists in the affected product. The vulnerability allows low-privilege users to edit scripts, bypassing Access Control Lists, and potentially gaining further access within the system. | 2024-06-14 | not yet calculated | CVE-2024-37369 [email protected] |
snipe–snipe-it | Users with “User:edit” and “Self:api” permissions can promote or demote themselves or other users by performing changes to the group’s memberships via API call.This issue affects snipe-it: from v4.6.17 through v6.4.1. | 2024-06-14 | not yet calculated | CVE-2024-5685 596c5446-0ce5-4ba2-aa66-48b3b757a647 596c5446-0ce5-4ba2-aa66-48b3b757a647 596c5446-0ce5-4ba2-aa66-48b3b757a647 |
Tibco–EBX | The component listed above contains a vulnerability that allows an attacker to traverse directories and access sensitive files, leading to unauthorized disclosure of system configuration and potentially sensitive information. | 2024-06-13 | not yet calculated | CVE-2024-4576 [email protected] |
Trol InterMedia Sp. z o.o. Sp. k.–2ClickPortal | Improper neutralization of input during web page generation vulnerability in 2ClickPortal software allows reflected cross-site scripting (XSS). An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user’s browser. This issue affects 2ClickPortal software versions from 7.2.31 through 7.6.4. | 2024-06-14 | not yet calculated | CVE-2024-5961 [email protected] [email protected] [email protected] |
Unknown–Alemha watermarker | The Alemha watermarker WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | 2024-06-14 | not yet calculated | CVE-2024-3754 [email protected] |
Unknown–Amen | The Amen WordPress plugin through 3.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | 2024-06-14 | not yet calculated | CVE-2024-3992 [email protected] |
Unknown–ARForms – Premium WordPress Form Builder Plugin | The ARForms – Premium WordPress Form Builder Plugin WordPress plugin before 6.4.1 does not properly escape user-controlled input when it is reflected in some of its AJAX actions. | 2024-06-12 | not yet calculated | CVE-2024-0427 [email protected] |
Unknown–AZAN Plugin | The AZAN Plugin WordPress plugin through 0.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | 2024-06-14 | not yet calculated | CVE-2024-3993 [email protected] |
Unknown–events-calendar-pro | The events-calendar-pro WordPress plugin before 6.4.0.1, The Events Calendar WordPress plugin before 6.4.0.1 does not prevent users with at least the contributor role from leaking details about events they shouldn’t have access to. (e.g. password-protected events, drafts, etc.) | 2024-06-14 | not yet calculated | CVE-2024-1295 [email protected] |
Unknown–Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button | The Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button WordPress plugin before 3.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | 2024-06-13 | not yet calculated | CVE-2024-4149 [email protected] |
Unknown–FooGallery | The FooGallery WordPress plugin before 2.4.15, foogallery-premium WordPress plugin before 2.4.15 does not validate and escape some of its Gallery settings before outputting them back in the page, which could allow users with a role as low as Author to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin | 2024-06-13 | not yet calculated | CVE-2024-2762 [email protected] |
Unknown–Inquiry cart | The Inquiry cart WordPress plugin through 3.4.2 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | 2024-06-14 | not yet calculated | CVE-2024-5155 [email protected] |
Unknown–LuckyWP Table of Contents | The LuckyWP Table of Contents WordPress plugin through 2.1.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | 2024-06-14 | not yet calculated | CVE-2024-2218 [email protected] |
Unknown–Pray For Me | The Pray For Me WordPress plugin through 1.0.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack | 2024-06-14 | not yet calculated | CVE-2024-3965 [email protected] |
Unknown–Pray For Me | The Pray For Me WordPress plugin through 1.0.4 does not sanitise and escape some parameters, which could unauthenticated visitors to perform Cross-Site Scripting attacks that trigger when an admin visits the Prayer Requests in the WP Admin | 2024-06-14 | not yet calculated | CVE-2024-3966 [email protected] |
Unknown–Search & Replace | The Search & Replace WordPress plugin before 3.2.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks (such as within a multi-site network). | 2024-06-13 | not yet calculated | CVE-2024-4145 [email protected] |
Unknown–Similarity | The Similarity WordPress plugin through 3.0 does not have CSRF check in place when resetting its settings, which could allow attackers to make a logged in admin reset them via a CSRF attack | 2024-06-14 | not yet calculated | CVE-2024-3971 [email protected] |
Unknown–Similarity | The Similarity WordPress plugin through 3.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | 2024-06-14 | not yet calculated | CVE-2024-3972 [email protected] |
Unknown–Social Pixel | The Social Pixel WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | 2024-06-14 | not yet calculated | CVE-2024-4005 [email protected] |
Unknown–Social Sharing Plugin | The Social Sharing Plugin WordPress plugin before 3.3.63 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | 2024-06-12 | not yet calculated | CVE-2024-4924 [email protected] |
Unknown–SVGator | The SVGator WordPress plugin through 1.2.6 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks. | 2024-06-14 | not yet calculated | CVE-2024-4271 [email protected] |
Unknown–SVGMagic | The SVGMagic WordPress plugin through 1.1 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks. | 2024-06-14 | not yet calculated | CVE-2024-4270 [email protected] |
Unknown–Themify Builder | Themify Builder WordPress plugin before 7.5.8 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue | 2024-06-13 | not yet calculated | CVE-2024-3032 [email protected] |
Unknown–Web Directory Free | The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based. | 2024-06-13 | not yet calculated | CVE-2024-3552 [email protected] |
Unknown–WordPress Jitsi Shortcode | The WordPress Jitsi Shortcode WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | 2024-06-14 | not yet calculated | CVE-2024-3977 [email protected] |
Unknown–WordPress Jitsi Shortcode | The WordPress Jitsi Shortcode WordPress plugin through 0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | 2024-06-14 | not yet calculated | CVE-2024-3978 [email protected] |
Unknown–WP Prayer II | The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its email settings, which could allow attackers to make a logged in admin change them via a CSRF attack | 2024-06-14 | not yet calculated | CVE-2024-4480 [email protected] |
Unknown–WP Prayer II | The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack | 2024-06-14 | not yet calculated | CVE-2024-4751 [email protected] |
Veeam–Recovery Orchestrator | Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator | 2024-06-11 | not yet calculated | CVE-2024-29855 [email protected] |
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.