Search Results (67421 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-9780 1 Wireshark 1 Wireshark 2024-10-17 7.8 High
ITS dissector crash in Wireshark 4.4.0 allows denial of service via packet injection or crafted capture file
CVE-2024-45060 1 Phpoffice 1 Phpspreadsheet 2024-10-17 7.1 High
PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. One of the sample scripts in PhpSpreadsheet is susceptible to a cross-site scripting (XSS) vulnerability due to improper handling of input where a number is expected leading to formula injection. The code in in `45_Quadratic_equation_solver.php` concatenates the user supplied parameters directly into spreadsheet formulas. This allows an attacker to take control over the formula and output unsanitized data into the page, resulting in JavaScript execution. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-9548 1 Wp-slimstat 1 Slimstat Analytics 2024-10-17 7.2 High
The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the resource parameter in all versions up to, and including, 5.2.6 due to insufficient input sanitization and output escaping when logging visitor requests. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2024-39516 1 Juniper 2 Junos, Junos Os Evolved 2024-10-16 7.5 High
An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems configured in either of two ways: * systems with BGP traceoptions enabled * systems with BGP traffic engineering configured This issue can affect iBGP and eBGP with any address family configured. The specific attribute involved is non-transitive, and will not propagate across a network. This issue affects: Junos OS:  * All versions before 21.4R3-S8, * 22.2 before 22.2R3-S5,  * 22.3 before 22.3R3-S4,  * 22.4 before 22.4R3-S3,  * 23.2 before 23.2R2-S2,  * 23.4 before 23.4R2;  Junos OS Evolved:  * All versions before 21.4R3-S8-EVO,  * 22.2-EVO before 22.2R3-S5-EVO,  * 22.3-EVO before 22.3R3-S4-EVO,  * 22.4-EVO before 22.4R3-S3-EVO,  * 23.2-EVO before 23.2R2-S2-EVO,  * 23.4-EVO before 23.4R2-EVO.
CVE-2024-9916 2 Huangdou, Usualtool 2 Utcms, Usualtoolcms 2024-10-16 7.3 High
A vulnerability, which was classified as critical, has been found in HuangDou UTCMS V9. Affected by this issue is some unknown functionality of the file app/modules/ut-cac/admin/cli.php. The manipulation of the argument o leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-9983 1 Ragic 1 Enterprise Cloud Database 2024-10-16 7.5 High
Enterprise Cloud Database from Ragic does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
CVE-2024-49193 1 Zendesk 1 Zendesk 2024-10-16 7.5 High
Zendesk before 2024-07-02 allows remote attackers to read ticket history via e-mail spoofing, because Cc fields are extracted from incoming e-mail messages and used to grant additional authorization for ticket viewing, the mechanism for detecting spoofed e-mail messages is insufficient, and the support e-mail addresses associated with individual tickets are predictable.
CVE-2024-8231 1 Tenda 2 O6, O6 Firmware 2024-10-16 8.8 High
A vulnerability classified as critical has been found in Tenda O6 1.0.0.7(2054). Affected is the function fromVirtualSet of the file /goform/setPortForward. The manipulation of the argument ip/localPort/publicPort/app leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-45290 1 Phpoffice 1 Phpspreadsheet 2024-10-16 7.7 High
PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. It's possible for an attacker to construct an XLSX file which links media from external URLs. When opening the XLSX file, PhpSpreadsheet retrieves the image size and type by reading the file contents, if the provided path is a URL. By using specially crafted `php://filter` URLs an attacker can leak the contents of any file or URL. Note that this vulnerability is different from GHSA-w9xv-qf98-ccq4, and resides in a different component. An attacker can access any file on the server, or leak information form arbitrary URLs, potentially exposing sensitive information such as AWS IAM credentials. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-33064 1 Qualcomm 10 Mdm9628, Mdm9628 Firmware, Qca6564a and 7 more 2024-10-16 8.2 High
Information disclosure while parsing the multiple MBSSID IEs from the beacon.
CVE-2024-33069 1 Qualcomm 88 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 85 more 2024-10-16 7.5 High
Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host.
CVE-2024-33070 1 Qualcomm 10 Mdm9628, Mdm9628 Firmware, Qca6564a and 7 more 2024-10-16 7.5 High
Transient DOS while parsing ESP IE from beacon/probe response frame.
CVE-2024-33071 1 Qualcomm 10 Mdm9628, Mdm9628 Firmware, Qca6564a and 7 more 2024-10-16 7.5 High
Transient DOS while parsing the MBSSID IE from the beacons when IE length is 0.
CVE-2024-44734 1 Mirotalk 1 Mirotalk P2p 2024-10-16 7.5 High
Incorrect access control in Mirotalk before commit 9de226 allows attackers to arbitrarily change usernames via sending a crafted roomAction request to the server.
CVE-2024-44729 1 Mirotalk 1 Mirotalk P2p 2024-10-16 7.5 High
Incorrect access control in the component app/src/server.js of Mirotalk before commit 9de226 allows unauthenticated attackers without presenter privileges to arbitrarily eject users from a meeting.
CVE-2020-36838 2024-10-16 7.4 High
The Facebook Chat Plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wp_ajax_update_options function in versions up to, and including, 1.5. This flaw makes it possible for low-level authenticated attackers to connect their own Facebook Messenger account to any site running the vulnerable plugin and engage in chats with site visitors on affected sites.
CVE-2021-4444 1 Woobewoo 1 Product Filter 2024-10-16 7.3 High
The Product Filter by WooBeWoo plugin for WordPress is vulnerable to authorization bypass in versions up to, and including 1.4.9 due to missing authorization checks on various functions. This makes it possible for unauthenticated attackers to perform unauthorized actions such as creating new filters and injecting malicious javascript into a vulnerable site. This was actively exploited at the time of discovery.
CVE-2024-38399 1 Qualcomm 80 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 77 more 2024-10-16 8.4 High
Memory corruption while processing user packets to generate page faults.
CVE-2012-10018 1 Mapplic 2 Mapplic, Mapplic Lite 2024-10-16 8.3 High
The Mapplic and Mapplic Lite plugins for WordPress are vulnerable to Server-Side Request Forgery in versions up to, and including 6.1, 1.0 respectively. This makes it possible for attackers to forgery requests coming from a vulnerable site's server and ultimately perform an XSS attack if requesting an SVG file.
CVE-2019-25215 1 Ari-soft 1 Ari Adminer 2024-10-16 7.3 High
The ARI-Adminer plugin for WordPress is vulnerable to authorization bypass due to a lack of file access controls in nearly every file of the plugin in versions up to, and including, 1.1.14. This makes it possible for unauthenticated attackers to call the files directly and perform a wide variety of unauthorized actions such as accessing a site's database and making changes.