9.8

CVSS3.1

CVE-2023-45249 -

Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (…

📅 Published: July 24, 2024, 2:03 p.m. 🔄 Last Modified: Oct. 22, 2025, 4:49 p.m.

8.8

CVSS3.1

CVE-2024-6096 - Unsafe Deserialization Vulnerability

In Progress® Telerik® Reporting versions prior to 18.1.24.709, a code execution attack is possible through object injection via an insecure type resolution vulnerability.

📅 Published: July 24, 2024, 2 p.m. 🔄 Last Modified: April 25, 2025, 11:15 p.m.

5.3

CVSS4.0

CVE-2024-7067 - kirilkirkov Ecommerce-Laravel-Bootstrap Cart.php getCartProductsIds deserialization

A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization.…

📅 Published: July 24, 2024, 2 p.m. 🔄 Last Modified: Nov. 21, 2024, 9:50 a.m.

9.9

CVSS3.1

CVE-2024-6327 - Progress Telerik Report Server Deserialization

In Progress® Telerik® Report Server versions prior to 2024 Q2 (10.1.24.709), a remote code execution attack is possible through an insecure deserialization vulnerability.

📅 Published: July 24, 2024, 1:57 p.m. 🔄 Last Modified: Nov. 21, 2024, 9:49 a.m.

6.4

CVSS3.1

CVE-2024-5818 - Royal Elementor Addons and Templates <= 1.3.980 - Authenticated (Contributor+) DOM-Based Stored Cro…

The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored DOM-based Cross-Site Scripting via the plugin's Magazine Grid/Slider widget in all versions up to, and including, 1.3.980 due to insufficient input sanitization and output escaping on user supplied attributes. Thi…

📅 Published: July 24, 2024, 12:43 p.m. 🔄 Last Modified: April 8, 2026, 5:04 p.m.

6.4

CVSS3.1

CVE-2024-3896 - Photo Gallery, Images, Slider in Rbs Image Gallery <= 3.2.19 - Authenticated (Contributor+) Stored …

The Photo Gallery, Images, Slider in Rbs Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the Gallery title field in all versions up to, and including, 3.2.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated …

📅 Published: July 24, 2024, 12:43 p.m. 🔄 Last Modified: April 8, 2026, 4:58 p.m.

6.4

CVSS3.1

CVE-2024-6896 - AMP for WP – Accelerated Mobile Pages <= 1.0.96.1 - Authenticated (Author+) Stored Cross-Site Scrip…

The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.96.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author…

📅 Published: July 24, 2024, 11 a.m. 🔄 Last Modified: April 8, 2026, 5:15 p.m.

6.9

CVSS4.0

CVE-2024-7066 - F-logic DataCube3 HTTP POST Request config_time_sync.php os command injection

A vulnerability was found in F-logic DataCube3 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/config_time_sync.php of the component HTTP POST Request Handler. The manipulation of the argument ntp_server leads to os command inject…

📅 Published: July 24, 2024, 11 a.m. 🔄 Last Modified: Nov. 21, 2024, 9:50 a.m.

6.9

CVSS4.0

CVE-2024-7065 - Spina CMS cross-site request forgery

A vulnerability was found in Spina CMS up to 2.18.0. It has been classified as problematic. Affected is an unknown function of the file /admin/pages/. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and…

📅 Published: July 24, 2024, 9:31 a.m. 🔄 Last Modified: Nov. 21, 2024, 9:50 a.m.

6.5

CVSS3.1

CVE-2024-3297 - Session establishment lock-up during replay of CASE Sigma1 messages

An issue in the Certificate Authenticated Session Establishment (CASE) protocol for establishing secure sessions between two devices, as implemented in the Matter protocol versions before Matter 1.1 allows an attacker to replay manipulated CASE Sigma1 messages to make the device unresponsive until …

📅 Published: July 24, 2024, 8:02 a.m. 🔄 Last Modified: Nov. 21, 2024, 9:29 a.m.
Total resulsts: 349182
Page 9060 of 34,919
« previous page » next page
Filters