6.4
CVE-2024-5289 - Gutenberg Blocks with AI by Kadence WP β Page Builder Features <= 3.2.42 - Authenticated (Contributβ¦
The Gutenberg Blocks with AI by Kadence WP β Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Google Maps widget parameters in all versions up to, and including, 3.2.42 due to insufficient input sanitization and output escaping. This makes it possible β¦
8.8
CVE-2024-6054 - Auto Featured Image <= 1.2 - Authenticated (Contributor+) Arbitrary File Upload
The Auto Featured Image plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'create_post_attachment_from_url' function in all versions up to, and including, 1.2. This makes it possible for authenticated attackers, with contributor-level and above β¦
9.1
CVE-2024-37371 - krb5: GSS message token handling
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
8.2
CVE-2024-39207 -
lua-shmem v1.0-1 was discovered to contain a buffer overflow via the shmem_write function.
7.5
CVE-2024-39130 -
A NULL Pointer Dereference discovered in DumpTS v0.1.0-nightly allows attackers to cause a denial of service via the function DumpOneStream() at /src/DumpStream.cpp.
9.8
CVE-2024-36072 -
Netwrix CoSoSys Endpoint Protector through 5.9.3 and CoSoSys Unify through 7.0.6 contain a remote code execution vulnerability in the logging component of the Endpoint Protector and Unify server application which allows an unauthenticated remote attacker to send a malicious request, resulting in thβ¦
4.7
CVE-2024-39153 -
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/info_deal.php?mudi=del&dataType=news&dataTypeCN.
6.3
CVE-2024-31802 -
DESIGNA ABACUS v.18 and before allows an attacker to bypass the payment process via a crafted QR code.
9.4
CVE-2024-36059 -
Directory Traversal vulnerability in Kalkitech ASE ASE61850 IEDSmart upto and including version 2.3.5 allows attackers to read/write arbitrary files via the IEC61850 File Transfer protocol.
9.8
CVE-2024-39208 -
luci-app-lucky v2.8.3 was discovered to contain hardcoded credentials.