Search Results (74804 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-4444 1 Woobewoo 1 Product Filter 2024-10-16 7.3 High
The Product Filter by WooBeWoo plugin for WordPress is vulnerable to authorization bypass in versions up to, and including 1.4.9 due to missing authorization checks on various functions. This makes it possible for unauthenticated attackers to perform unauthorized actions such as creating new filters and injecting malicious javascript into a vulnerable site. This was actively exploited at the time of discovery.
CVE-2024-38399 1 Qualcomm 80 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 77 more 2024-10-16 8.4 High
Memory corruption while processing user packets to generate page faults.
CVE-2024-8422 1 Schneider-electric 1 Zelio Soft 2 2024-10-16 7.8 High
CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution, denial of service and loss of confidentiality & integrity when application user opens a malicious Zelio Soft 2 project file.
CVE-2024-8215 2 Payara, Payara Platform 2 Payara, Payara Server 2024-10-16 8.4 High
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Payara Platform Payara Server (Admin Console modules) allows Remote Code Inclusion.This issue affects Payara Server: from 5.20.0 before 5.68.0, from 6.0.0 before 6.19.0, from 6.2022.1 before 6.2024.10, from 4.1.2.191.1 before 4.1.2.191.51.
CVE-2024-47559 1 Xerox 1 Freeflow Core 2024-10-16 7.6 High
Authenticated RCE via Path Traversal
CVE-2024-47558 1 Xerox 1 Freeflow Core 2024-10-16 7.6 High
Authenticated RCE via Path Traversal
CVE-2024-47556 1 Xerox 1 Freeflow Core 2024-10-16 8.3 High
Pre-Auth RCE via Path Traversal
CVE-2024-47557 1 Xerox 1 Freeflow Core 2024-10-16 8.3 High
Pre-Auth RCE via Path Traversal
CVE-2023-32192 1 Kubernetes 1 Apiserver 2024-10-16 8.3 High
A vulnerability has been identified in which unauthenticated cross-site scripting (XSS) in the API Server's public API endpoint can be exploited, allowing an attacker to execute arbitrary JavaScript code in the victim browser
CVE-2023-32194 1 Rancher 1 Rancher 2024-10-16 7.2 High
A vulnerability has been identified when granting a create or * global role for a resource type of "namespaces"; no matter the API group, the subject will receive * permissions for core namespaces. This can lead to someone being capable of accessing, creating, updating, or deleting a namespace in the project.
CVE-2024-35520 1 Netgear 2 R7000, R7000 Firmware 2024-10-16 8.4 High
Netgear R7000 1.0.11.136 is vulnerable to Command Injection in RMT_invite.cgi via device_name2 parameter.
CVE-2024-8977 1 Gitlab 1 Gitlab 2024-10-16 8.2 High
An issue has been discovered in GitLab EE affecting all versions starting from 15.10 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. Instances with Product Analytics Dashboard configured and enabled could be vulnerable to SSRF attacks.
CVE-2024-6530 1 Gitlab 1 Gitlab 2024-10-16 7.3 High
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When adding a authorizing an application, it can be made to render as HTML under specific circumstances.
CVE-2024-9782 2 D-link, Dlink 3 Dir-619l B1, Dir-619l, Dir-619l Firmware 2024-10-16 8.8 High
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been declared as critical. This vulnerability affects the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-9783 2 D-link, Dlink 3 Dir-619l B1, Dir-619l, Dir-619l Firmware 2024-10-16 8.8 High
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been rated as critical. This issue affects the function formLogDnsquery of the file /goform/formLogDnsquery. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-47846 2 Mediawiki, Wikimedia 2 Cargo, Mediawiki-cargo 2024-10-16 8.8 High
Cross-Site Request Forgery (CSRF) vulnerability in The Wikimedia Foundation Mediawiki - Cargo allows Cross Site Request Forgery.This issue affects Mediawiki - Cargo: from 3.6.X before 3.6.1.
CVE-2023-22650 1 Suse 1 Rancher 2024-10-16 8.8 High
A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s tokens still usable.
CVE-2024-22030 1 Suse 1 Rancher 2024-10-16 8 High
A vulnerability has been identified within Rancher that can be exploited in narrow circumstances through a man-in-the-middle (MITM) attack. An attacker would need to have control of an expired domain or execute a DNS spoofing/hijacking attack against the domain to exploit this vulnerability. The targeted domain is the one used as the Rancher URL.
CVE-2023-32193 1 Rancher 1 Norman 2024-10-16 8.3 High
A vulnerability has been identified in which unauthenticated cross-site scripting (XSS) in Norman's public API endpoint can be exploited. This can lead to an attacker exploiting the vulnerability to trigger JavaScript code and execute commands remotely.
CVE-2020-36839 2024-10-16 8.3 High
The WP Lead Plus X plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.99. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to perform administrative actions, such as adding pages to the site and/or replacing site content with malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.