7.7

CVSS3.1

CVE-2021-32589 -

A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 an…

📅 Published: Dec. 19, 2024, 12:22 p.m. 🔄 Last Modified: Jan. 31, 2025, 5:42 p.m.

5.5

CVSS3.1

CVE-2024-45819 - libxl leaks data to PVH guests via ACPI tables

PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied into guest memory. While actually used parts of the local memory are filled in correctly, excess space that is being allocated is left with its prio…

📅 Published: Dec. 19, 2024, noon 🔄 Last Modified: Jan. 14, 2026, 8:41 p.m.

6.5

CVSS3.1

CVE-2024-45818 - Deadlock in x86 HVM standard VGA handling

The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulat…

📅 Published: Dec. 19, 2024, noon 🔄 Last Modified: May 20, 2025, 4:28 p.m.

0.0

CVE-2024-37962 - WordPress Fusion Page Builder plugin <= 1.6.1 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Agency Dominion Inc. Fusion fusion.This issue affects Fusion: from n/a through <= 1.6.1.

📅 Published: Dec. 19, 2024, 11:24 a.m. 🔄 Last Modified: April 1, 2026, 4:17 p.m.

9.6

CVSS3.1

CVE-2024-12626 - AutomatorWP <= 5.0.9 - Reflected Cross-Site Scripting via a-0-o-search_field_value

The AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘a-0-o-search_field_value’ parameter in all versions up to, and including, 5.0.9 due to insufficient input sanitizatio…

📅 Published: Dec. 19, 2024, 11:14 a.m. 🔄 Last Modified: April 8, 2026, 5:21 p.m.

4.3

CVSS3.1

CVE-2024-12331 - File Manager Pro – Filester <= 1.8.6 - Missing Authorization to Authenticated (Subscriber+) Filebir…

The File Manager Pro – Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_install_plugin' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level acce…

📅 Published: Dec. 19, 2024, 11:14 a.m. 🔄 Last Modified: April 8, 2026, 4:55 p.m.

7.6

CVSS3.1

CVE-2021-26115 -

An OS command injection (CWE-78) vulnerability in FortiWAN version 4.5.7 and below Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.An OS command injection (CWE-78) vulnerability in Forti…

📅 Published: Dec. 19, 2024, 10:57 a.m. 🔄 Last Modified: Jan. 21, 2025, 8:30 p.m.

8.6

CVSS3.1

CVE-2020-15934 -

An execution with unnecessary privileges vulnerability in the VCM engine of FortiClient for Linux versions 6.2.7 and below, version 6.4.0. may allow local users to elevate their privileges to root by creating a malicious script or program on the target machine.

📅 Published: Dec. 19, 2024, 10:57 a.m. 🔄 Last Modified: Jan. 21, 2025, 8:38 p.m.

5.4

CVSS3.1

CVE-2020-12820 -

Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClien…

📅 Published: Dec. 19, 2024, 10:57 a.m. 🔄 Last Modified: Jan. 21, 2025, 8:42 p.m.

5.6

CVSS4.0

CVE-2024-11616 - Double-fetch heap overflow

Netskope was made aware of a security vulnerability in Netskope Endpoint DLP’s Content Control Driver where a double-fetch issue leads to heap overflow. The vulnerability arises from the fact that the NumberOfBytes argument to ExAllocatePoolWithTag, and the Length argument for RtlCopyMemory, both i…

📅 Published: Dec. 19, 2024, 9:46 a.m. 🔄 Last Modified: June 9, 2025, 5:15 p.m.
Total resulsts: 344072
Page 6901 of 34,408
« previous page » next page
Filters