5.1

CVSS4.0

CVE-2024-10122 - Topdata Inner Rep Plus WebServer Operator Details Form InnerRepPlus.html missing password field masโ€ฆ

A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been classified as problematic. Affected is an unknown function of the file /InnerRepPlus.html of the component Operator Details Form. The manipulation leads to missing password field masking. It is possible to launch the atโ€ฆ

๐Ÿ“… Published: Oct. 18, 2024, 7 p.m. ๐Ÿ”„ Last Modified: Nov. 6, 2024, 10:05 p.m.

8.1

CVSS4.0

CVE-2024-49361 - Potential Vulnerability in ACON Library: Improper Input Validation Leading to Malicious Code Executโ€ฆ

ACON is a widely-used library of tools for machine learning that focuses on adaptive correlation optimization. A potential vulnerability has been identified in the input validation process, which could lead to arbitrary code execution if exploited. This issue could allow an attacker to submit malicโ€ฆ

๐Ÿ“… Published: Oct. 18, 2024, 6:55 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

6.9

CVSS4.0

CVE-2024-10121 - wfh45678 Radar Interface authorization

A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosedโ€ฆ

๐Ÿ“… Published: Oct. 18, 2024, 6:31 p.m. ๐Ÿ”„ Last Modified: Oct. 30, 2024, 9:21 p.m.

8.3

CVSS3.1

CVE-2024-9593 - Time Clock <= 1.2.2 & Time Clock Pro <= 1.1.4 - Unauthenticated (Limited) Remote Code Execution

The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute codeโ€ฆ

๐Ÿ“… Published: Oct. 18, 2024, 5:32 p.m. ๐Ÿ”„ Last Modified: April 8, 2026, 4:42 p.m.

6.9

CVSS4.0

CVE-2024-10120 - wfh45678 Radar upload unrestricted upload

A vulnerability has been found in wfh45678 Radar up to 1.0.8 and classified as critical. This vulnerability affects unknown code of the file /services/v1/common/upload. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disโ€ฆ

๐Ÿ“… Published: Oct. 18, 2024, 5 p.m. ๐Ÿ”„ Last Modified: Oct. 30, 2024, 8:20 p.m.

4.6

CVSS3.1

CVE-2024-48016 -

Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The attacker may be able tโ€ฆ

๐Ÿ“… Published: Oct. 18, 2024, 4:34 p.m. ๐Ÿ”„ Last Modified: Dec. 13, 2024, 3:13 p.m.

5.5

CVSS3.1

CVE-2024-47241 -

Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains an Improper Certificate Validation vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access and modification of transmitted data.

๐Ÿ“… Published: Oct. 18, 2024, 4:28 p.m. ๐Ÿ”„ Last Modified: Dec. 13, 2024, 2:37 p.m.

7.8

CVSS3.1

CVE-2023-6080 - Privilege Escalation to SYSTEM in Lakeside Software Installer

Lakeside Softwareโ€™s SysTrack LsiAgent Installer version 10.7.8 for Windows contains a local privilege escalation vulnerability which allows attackers SYSTEM level access.

๐Ÿ“… Published: Oct. 18, 2024, 4:09 p.m. ๐Ÿ”„ Last Modified: April 1, 2026, 4:11 p.m.

5.5

CVSS3.1

CVE-2024-42508 -

This vulnerability could be exploited, leading to unauthorized disclosure of information to authenticated users.

๐Ÿ“… Published: Oct. 18, 2024, 3:10 p.m. ๐Ÿ”„ Last Modified: Jan. 8, 2026, 5:02 p.m.

9.3

CVSS4.0

CVE-2024-9537 - ScienceLogic SL1 unspecified vulnerability

ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version linesโ€ฆ

๐Ÿ“… Published: Oct. 18, 2024, 2:45 p.m. ๐Ÿ”„ Last Modified: Nov. 3, 2025, 6:55 p.m.
Total resulsts: 349182
Page 8237 of 34,919
ยซ previous page ยป next page
Filters