Total 277601 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-42441 1 Zoom 4 Macos Meeting Sdk, Meeting Software Development Kit, Rooms and 1 more 2024-08-28 6.2 Medium
Improper privilege management in the installer for Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS and Zoom Rooms Client for macOS before 6.1.5 may allow a privileged user to conduct an escalation of privilege via local access.
CVE-2024-31905 1 Ibm 1 Qradar Network Packet Capture 2024-08-28 5.9 Medium
IBM QRadar Network Packet Capture 7.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 289858.
CVE-2024-7867 1 Xpdfreader 1 Xpdf 2024-08-28 6.2 Medium
In Xpdf 4.05 (and earlier), very large coordinates in a page box can cause an integer overflow and divide-by-zero.
CVE-2023-7049 2024-08-28 4.3 Medium
The Custom Field For WP Job Manager plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2 via the the 'cm_fieldshow' shortcode due to missing validation on the 'job_id' user controlled key. This makes it possible for authenticated attackers, with contributor-level access and above, to expose potentially sensitive post metadata.
CVE-2024-42466 1 Upkeeper 1 Upkeeper Manager 2024-08-28 9.8 Critical
Improper Restriction of Excessive Authentication Attempts vulnerability in upKeeper Solutions product upKeeper Manager allows Authentication Abuse.This issue affects upKeeper Manager: through 5.1.9.
CVE-2024-42462 1 Upkeeper 1 Upkeeper Manager 2024-08-28 9.8 Critical
Improper Authentication vulnerability in upKeeper Solutions product upKeeper Manager allows Authentication Bypass.This issue affects upKeeper Manager: through 5.1.9.
CVE-2024-42463 1 Upkeeper 1 Upkeeper Manager 2024-08-28 6.5 Medium
Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9.
CVE-2024-42464 1 Upkeeper 1 Upkeeper Manager 2024-08-28 6.5 Medium
Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9.
CVE-2024-42465 1 Upkeeper 1 Upkeeper Manager 2024-08-28 9.8 Critical
Improper Restriction of Excessive Authentication Attempts vulnerability in upKeeper Solutions product upKeeper Manager allows Authentication Abuse.This issue affects upKeeper Manager: through 5.1.9.
CVE-2023-4024 2 Softlab, Softlabbd 2 Radio Player, Radio Player 2024-08-28 5.3 Medium
The Radio Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_player function in versions up to, and including, 2.0.73. This makes it possible for unauthenticated attackers to delete player instances.
CVE-2023-4025 2 Softlab, Softlabbd 2 Radio Player, Radio Player 2024-08-28 5.3 Medium
The Radio Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_player function in versions up to, and including, 2.0.73. This makes it possible for unauthenticated attackers to update player instances.
CVE-2024-7578 1 Alientechnology 2 Alr-f800, Alr-f800 Firmware 2024-08-28 7.3 High
A vulnerability was found in Alien Technology ALR-F800 up to 19.10.24.00. It has been classified as critical. Affected is an unknown function of the file /var/www/cmd.php. The manipulation of the argument cmd leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-7579 1 Alientechnology 2 Alr-f800, Alr-f800 Firmware 2024-08-28 6.3 Medium
A vulnerability was found in Alien Technology ALR-F800 up to 19.10.24.00. It has been declared as critical. Affected by this vulnerability is the function popen of the file /var/www/cgi-bin/upgrade.cgi of the component File Name Handler. The manipulation of the argument uploadedFile leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-7061 1 Okta 1 Verify 2024-08-28 5.5 Medium
Okta Verify for Windows is vulnerable to privilege escalation through DLL hijacking. The vulnerability is fixed in Okta Verify for Windows version 5.0.2. To remediate this vulnerability, upgrade to 5.0.2 or greater.
CVE-2024-43915 1 Zephyr-one 1 Zephyr Project Manager 2024-08-28 5.5 Medium
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dylan James Zephyr Project Manager allows Reflected XSS.This issue affects Zephyr Project Manager: from n/a through .3.102.
CVE-2024-41310 1 Yanzhenjie 1 Andserver 2024-08-28 7.5 High
AndServer 2.1.12 is vulnerable to Directory Traversal.
CVE-2024-42845 1 Invesalius 1 Invesalius 2024-08-28 8 High
An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
CVE-2024-34087 1 G8bpq 1 Bpq32 2024-08-28 9.8 Critical
An SEH-based buffer overflow in the BPQ32 HTTP Server in BPQ32 6.0.24.1 allows remote attackers with access to the Web Terminal to achieve remote code execution via an HTTP POST /TermInput request.
CVE-2024-7940 1 Hitachienergy 1 Microscada X Sys600 2024-08-28 8.3 High
The product exposes a service that is intended for local only to all network interfaces without any authentication.
CVE-2024-7986 2024-08-28 N/A
A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor to disclose sensitive information. A threat actor can exploit this vulnerability by abusing the ThinServer™ service to read arbitrary files by creating a junction that points to the target directory.