7.3

CVSS3.1

CVE-2024-28138 - OS Command Injection

An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user.ย The HTTP GET parameter "data" is not properly sanitized.

๐Ÿ“… Published: Dec. 10, 2024, 7:35 a.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

6.1

CVSS3.1

CVE-2024-11107 - System Dashboard < 2.8.15 - Unauthenticated Stored XSS

The System Dashboard WordPress plugin before 2.8.15 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks.

๐Ÿ“… Published: Dec. 10, 2024, 6 a.m. ๐Ÿ”„ Last Modified: May 17, 2025, 2:02 a.m.

4.9

CVSS3.1

CVE-2024-10708 - System Dashboard < 2.8.15 - Admin+ Path Traversal

The System Dashboard WordPress plugin before 2.8.15 does not validate user input used in a path, which could allow high privilege users such as admin to perform path traversal attacks an read arbitrary files on the server

๐Ÿ“… Published: Dec. 10, 2024, 6 a.m. ๐Ÿ”„ Last Modified: May 17, 2025, 2 a.m.

7.7

CVSS3.1

CVE-2023-6947 - Best WordPress Gallery Plugin โ€“ FooGallery <= 2.4.16 - Authenticated (Contributor+) Directory Traveโ€ฆ

The Best WordPress Gallery Plugin โ€“ FooGallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.26. This makes it possible for authenticated attackers, with contributor level or higher to read the contents of arbitrary folders on the server, which โ€ฆ

๐Ÿ“… Published: Dec. 10, 2024, 5:24 a.m. ๐Ÿ”„ Last Modified: April 8, 2026, 4:58 p.m.

7.7

CVSS4.0

CVE-2024-21542 -

Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) due to improper destination file path validation in the _extract_packages_archive function.

๐Ÿ“… Published: Dec. 10, 2024, 5 a.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.5

CVSS3.1

CVE-2024-11205 - WPForms 1.8.4 - 1.9.2.1 - Missing Authorization to Authenticated (Subscriber+) Payment Refund and Sโ€ฆ

The WPForms plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wpforms_is_admin_page' function in versions starting from 1.8.4 up to, and including, 1.9.2.1. This makes it possible for authenticated attackers, with Subscriber-level acceโ€ฆ

๐Ÿ“… Published: Dec. 10, 2024, 4:23 a.m. ๐Ÿ”„ Last Modified: Aug. 12, 2025, 7:06 p.m.

10

CVSS3.1

CVE-2024-37143 -

Dell PowerFlex appliance versions prior to IC 46.381.00 and IC 46.376.00, Dell PowerFlex rack versions prior to RCM 3.8.1.0 (for RCM 3.8.x train) and prior to RCM 3.7.6.0 (for RCM 3.7.x train), Dell PowerFlex custom node using PowerFlex Manager versions prior to 4.6.1.0, Dell InsightIQ versions priโ€ฆ

๐Ÿ“… Published: Dec. 10, 2024, 2:25 a.m. ๐Ÿ”„ Last Modified: Jan. 22, 2026, 4:24 p.m.

8.2

CVSS3.1

CVE-2024-37144 -

Dell PowerFlex appliance versions prior to IC 46.381.00 and IC 46.376.00, Dell PowerFlex rack versions prior to RCM 3.8.1.0 (for RCM 3.8.x train) and prior to RCM 3.7.6.0 (for RCM 3.7.x train), Dell PowerFlex custom node using PowerFlex Manager versions prior to 4.6.1.0, Dell InsightIQ versions priโ€ฆ

๐Ÿ“… Published: Dec. 10, 2024, 2:11 a.m. ๐Ÿ”„ Last Modified: Jan. 22, 2026, 4:16 p.m.

8.5

CVSS3.1

CVE-2024-54198 - Information Disclosure vulnerability through Remote Function Call (RFC) in SAP NetWeaver Applicatioโ€ฆ

In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose credentials for a remote service. These credentials can then be further exploited to completely compromโ€ฆ

๐Ÿ“… Published: Dec. 10, 2024, 12:12 a.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.2

CVSS3.1

CVE-2024-54197 - Server-Side Request Forgery in SAP NetWeaver Administrator (System Overview)

SAP NetWeaver Administrator(System Overview) allows an authenticated attacker to enumerate accessible HTTP endpoints in the internal network by specially crafting HTTP requests. On successful exploitation this can result in Server-Side Request Forgery (SSRF) which could have a low impact on integriโ€ฆ

๐Ÿ“… Published: Dec. 10, 2024, 12:12 a.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 346556
Page 7294 of 34,656
ยซ previous page ยป next page
Filters