5.3
CVE-2024-35683 - WordPress Leyka plugin <= 3.31.1 - Broken Access Control vulnerability
Missing Authorization vulnerability in Teplitsa of social technologies Leyka.This issue affects Leyka: from n/a through 3.31.1.
5.4
CVE-2023-52183 - WordPress WordPress Backup & Migration plugin <= 1.4.3 - Broken Access Control vulnerability
Missing Authorization vulnerability in WebToffee WordPress Backup & Migration.This issue affects WordPress Backup & Migration: from n/a through 1.4.3.
5.3
CVE-2024-34442 - WordPress weDocs plugin <= 2.1.4 - Broken Access Control vulnerability
Missing Authorization vulnerability in weDevs weDocs.This issue affects weDocs: from n/a through 2.1.4.
7.4
CVE-2024-28021 -
A vulnerability exists in the FOXMAN-UN/UNEM server that affects the message queueing mechanismβs certificate validation. If exploited an attacker could spoof a trusted entity causing a loss of confidentiality and integrity.
8.6
CVE-2024-2011 -
A heap-based buffer overflow vulnerability exists in the FOXMAN-UN/UNEM that if exploited will generally lead to a denial of service but can be used to execute arbitrary code, which is usually outside the scope of a program's implicit security policy
9.1
CVE-2024-2012 -
vulnerability exists in the FOXMAN-UN/UNEM server / API Gateway that if exploited an attacker could use to allow unintended commands or code to be executed on the UNEM server allowing sensitive data to be read or modified or could cause other unintended behavior
10
CVE-2024-2013 -
An authentication bypass vulnerability exists in the FOXMAN-UN/UNEM server / API Gateway component that if exploited allows attackers without any access to interact with the services and the post-authentication attack surface.
6.9
CVE-2024-2461 -
If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible
6.8
CVE-2024-2462 -
Allow attackers to intercept or falsify data exchanges between the client and the server
9.8
CVE-2024-5701 -
Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127.