Search Results (322830 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-44765 1 Mgt-commerce 1 Cloudpanel 2024-11-18 6.5 Medium
An Improper Authorization (Access Control Misconfiguration) vulnerability in MGT-COMMERCE GmbH CloudPanel v2.0.0 to v2.4.2 allows low-privilege users to bypass access controls and gain unauthorized access to sensitive configuration files and administrative functionality.
CVE-2024-21510 1 Redhat 1 Enterprise Linux 2024-11-18 5.4 Medium
Versions of the package sinatra from 0.0.0 are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the X-Forwarded-Host (XFH) header. When making a request to a method with redirect applied, it is possible to trigger an Open Redirect Attack by inserting an arbitrary address into this header. If used for caching purposes, such as with servers like Nginx, or as a reverse proxy, without handling the X-Forwarded-Host header, attackers can potentially exploit Cache Poisoning or Routing-based SSRF.
CVE-2024-21534 2 Jsonpath-plus, Redhat 3 Jsonpath, Openshift Devspaces, Rhdh 2024-11-18 9.8 Critical
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
CVE-2024-21540 2024-11-17 N/A
This issue is not a vulnerability because no real attack scenario can happen.
CVE-2024-39388 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2024-11-16 7.8 High
Substance3D - Stager versions 3.0.2 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47427 1 Adobe 1 Substance 3d Painter 2024-11-16 7.8 High
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47426 1 Adobe 1 Substance 3d Painter 2024-11-16 7.8 High
Substance3D - Painter versions 10.1.0 and earlier are affected by a Double Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-49519 1 Adobe 1 Substance 3d Painter 2024-11-16 7.8 High
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-49525 1 Adobe 1 Substance 3d Painter 2024-11-16 7.8 High
Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47443 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2024-11-16 7.8 High
After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47442 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2024-11-16 7.8 High
After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47441 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2024-11-16 7.8 High
After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-33031 1 Qualcomm 32 Ar8035, Ar8035 Firmware, Fastconnect 7800 and 29 more 2024-11-16 6.7 Medium
Memory corruption while processing the update SIM PB records request.
CVE-2024-23386 1 Qualcomm 20 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 17 more 2024-11-16 6.7 Medium
memory corruption when WiFi display APIs are invoked with large random inputs.
CVE-2024-38424 1 Qualcomm 240 Ar8035, Ar8035 Firmware, Fastconnect 6200 and 237 more 2024-11-16 7.8 High
Memory corruption during GNSS HAL process initialization.
CVE-2024-38410 1 Qualcomm 51 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 48 more 2024-11-16 7.8 High
Memory corruption while IOCLT is called when device is in invalid state and the WMI command buffer may be freed twice.
CVE-2024-38409 1 Qualcomm 51 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 48 more 2024-11-16 7.8 High
Memory corruption while station LL statistic handling.
CVE-2024-38407 1 Qualcomm 89 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 86 more 2024-11-16 7.8 High
Memory corruption while processing input parameters for any IOCTL call in the JPEG Encoder driver.
CVE-2024-38406 1 Qualcomm 89 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 86 more 2024-11-16 7.8 High
Memory corruption while handling IOCTL calls in JPEG Encoder driver.
CVE-2024-49509 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2024-11-16 7.8 High
InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.