CVE Alert: CVE-2024-0134
Vulnerability Summary: CVE-2024-0134 NVIDIA Container Toolkit and NVIDIA GPU Operator for Linux contain a UNIX vulnerability where a specially crafted...
Vulnerability Summary: CVE-2024-0134 NVIDIA Container Toolkit and NVIDIA GPU Operator for Linux contain a UNIX vulnerability where a specially crafted...
Vulnerability Summary: CVE-2024-49377 OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.2...
Vulnerability Summary: CVE-2024-9579 A potential vulnerability was discovered in certain Poly video conferencing devices. The firmware flaw does not properly...
Vulnerability Summary: CVE-2024-51493 OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.2...
Vulnerability Summary: CVE-2024-49773 SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Poor input validation in export allows...
Vulnerability Summary: CVE-2024-50333 SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. User input is not validated and...
Vulnerability Summary: CVE-2024-49774 SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. SuiteCRM relies on the blacklist of...
Vulnerability Summary: CVE-2024-50332 SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Insufficient input value validation causes Blind...
Vulnerability Summary: CVE-2024-47462 An arbitrary file creation vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. Successful exploitation...
Vulnerability Summary: CVE-2024-51740 Combodo iTop is a simple, web based IT Service Management tool. This vulnerability can be used to...
Vulnerability Summary: CVE-2024-50335 SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. The "Publish Key" field in SuiteCRM's...
Vulnerability Summary: CVE-2024-10084 The Contact Form 7 – Dynamic Text Extension plugin for WordPress is vulnerable to Basic Information Disclosure...
Vulnerability Summary: CVE-2024-7995 A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due...
Vulnerability Summary: CVE-2024-47460 Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending...
Vulnerability Summary: CVE-2024-42509 Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending...
Vulnerability Summary: CVE-2024-47463 An arbitrary file creation vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. Successful exploitation...
Vulnerability Summary: CVE-2024-47464 An authenticated Path Traversal vulnerability exists in Instant AOS-8 and AOS-10. Successful exploitation of this vulnerability allows...
Vulnerability Summary: CVE-2024-47461 An authenticated command injection vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. A successful...
Vulnerability Summary: CVE-2024-51665 Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical Addons For Elementor allows Server Side Request Forgery.This...
Vulnerability Summary: CVE-2024-51582 Path Traversal: '.../...//' vulnerability in ThimPress WP Hotel Booking allows PHP Local File Inclusion.This issue affects WP...
Vulnerability Summary: CVE-2024-50526 Unrestricted Upload of File with Dangerous Type vulnerability in mahlamusa Multi Purpose Mail Form allows Upload a...
Vulnerability Summary: CVE-2024-50528 Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Stacks Stacks Mobile App Builder...
Vulnerability Summary: CVE-2024-50527 Unrestricted Upload of File with Dangerous Type vulnerability in Stacks Stacks Mobile App Builder allows Upload a...
Vulnerability Summary: CVE-2024-51253 In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling...