Total
274565 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-54534 | 1 Apple | 7 Ipados, Iphone Os, Macos and 4 more | 2024-12-21 | 8.8 High |
The issue was addressed with improved memory handling. This issue is fixed in watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to memory corruption. | ||||
CVE-2024-54505 | 1 Apple | 7 Ipados, Iphone Os, Macos and 4 more | 2024-12-21 | 6.5 Medium |
A type confusion issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to memory corruption. | ||||
CVE-2024-12727 | 2024-12-21 | 9.8 Critical | ||
A pre-auth SQL injection vulnerability in the email protection feature of Sophos Firewall versions older than 21.0 MR1 (21.0.1) allows access to the reporting database and can lead to remote code execution if a specific configuration of Secure PDF eXchange (SPX) is enabled in combination with the firewall running in High Availability (HA) mode. | ||||
CVE-2024-12729 | 2024-12-21 | 8.8 High | ||
A post-auth code injection vulnerability in the User Portal allows authenticated users to execute code remotely in Sophos Firewall older than version 21.0 MR1 (21.0.1). | ||||
CVE-2024-12728 | 2024-12-21 | 9.8 Critical | ||
A weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall older than version 20.0 MR3 (20.0.3). | ||||
CVE-2024-21726 | 2024-12-21 | 6.5 Medium | ||
Inadequate content filtering leads to XSS vulnerabilities in various components. | ||||
CVE-2024-40744 | 1 Tassosgr | 1 Convert Forms | 2024-12-21 | 9.8 Critical |
Unrestricted file upload via security bypass in Convert Forms component for Joomla in versions before 4.4.8. | ||||
CVE-2024-40745 | 2024-12-21 | 5.4 Medium | ||
Reflected Cross site scripting vulnerability in Convert Forms component for Joomla in versions before 4.4.8. | ||||
CVE-2024-52538 | 2024-12-21 | 7.6 High | ||
Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection. | ||||
CVE-2024-47484 | 2024-12-21 | 8.2 High | ||
Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution. | ||||
CVE-2024-47977 | 2024-12-21 | 7.1 High | ||
Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution. | ||||
CVE-2024-55089 | 2024-12-21 | N/A | ||
Rhymix 2.1.19 is vulnerable to Server-Side Request Forgery (SSRF) in the background import data function. | ||||
CVE-2024-55088 | 2024-12-21 | 8.8 High | ||
GetSimple CMS CE 3.3.19 is vulnerable to Server-Side Request Forgery (SSRF) in the backend plugin module. | ||||
CVE-2024-49202 | 2024-12-21 | 7.6 High | ||
Keyfactor Command before 12.5.0 has Incorrect Access Control: access tokens are over permissioned, aka 64099. The fixed versions are 11.5.1.1, 11.5.2.1, 11.5.3.1, 11.5.4.5, 11.5.6.1, 11.6.0, 12.2.0.1, 12.3.0.1, 12.4.0.1, 12.5.0, and 24.4.0. | ||||
CVE-2024-49201 | 2024-12-21 | 4.3 Medium | ||
Keyfactor Remote File Orchestrator (aka remote-file-orchestrator) 2.8 before 2.8.1 allows Information Disclosure: sensitive information could be exposed at the debug logging level. | ||||
CVE-2023-31280 | 2024-12-21 | 5.3 Medium | ||
An AirVantage online Warranty Checker tool vulnerability could allow an attacker to perform bulk enumeration of IMEI and Serial Numbers pairs. The AirVantage Warranty Checker is updated to no longer return the IMEI and Serial Number in addition to the warranty status when the Serial Number or IMEI is used to look up warranty status. | ||||
CVE-2023-31279 | 2024-12-21 | 8.1 High | ||
The AirVantage platform is vulnerable to an unauthorized attacker registering previously unregistered devices on the AirVantage platform when the owner has not disabled the AirVantage Management Service on the devices or registered the device. This could enable an attacker to configure, manage, and execute AT commands on an unsuspecting user’s devices. | ||||
CVE-2023-1159 | 1 Booking-wp-plugin | 1 Bookly | 2024-12-20 | 4 Medium |
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via service titles in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | ||||
CVE-2023-3051 | 1 Azexo | 1 Page Builder With Image Map By Azexo | 2024-12-20 | 6.4 Medium |
The Page Builder by AZEXO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'azh_post' shortcode in versions up to, and including, 1.27.133 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | ||||
CVE-2023-3055 | 1 Azexo | 1 Page Builder With Image Map By Azexo | 2024-12-20 | 6.1 Medium |
The Page Builder by AZEXO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.27.133. This is due to missing or incorrect nonce validation on the 'azh_save' function. This makes it possible for unauthenticated attackers to update the post content and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. |