眈眈探求 |
+ 2024-09-06 05:15:13 |
Dell SmartFabric OS10 Software, version(s) 10.5.5.4 through 10.5.5.10 and 10.5.6.x , contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution. |
详情 |
-
- b287915f41e51da29950425b9111220e |
- CVE-2024-6929 |
- 2024-09-05 10:15:03 |
- The Dynamic Featured Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘dfiFeatured’ parameter in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
- 详情 |
-
-
-
- 11daf155960d50d694ef3a84124e2380 |
- CVE-2024-6894 |
- 2024-09-05 10:15:03 |
- The RD Station plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.3.2 due to insufficient input sanitization and output escaping of post metaboxes added by the plugin. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
- 详情 |
-
-
-
- 40b37271ec8f930e4c22ccc8d2c296cc |
- CVE-2024-6332 |
- 2024-09-05 10:15:02 |
- The Booking for Appointments and Events Calendar – Amelia Premium and Lite plugins for WordPress are vulnerable to unauthorized access of data due to a missing capability check on the 'ameliaButtonCommand' function in all versions up to, and including, Premium 7.7 and Lite 1.2.3. This makes it possible for unauthenticated attackers to access employee calendar details, including Google Calendar OAuth tokens in the premium version. |
- 详情 |
-
-
-
- 118c30f85a0f1dbc8f3c089552742821 |
- CVE-2024-8363 |
- 2024-09-05 09:15:04 |
- The Share This Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's STI Buttons shortcode in all versions up to, and including, 2.02 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
- 详情 |
-
-
-
- 4187510ba71a48716a9609e4014f76b0 |
- CVE-2024-5309 |
- 2024-09-05 09:15:04 |
- The Form Vibes – Database Manager for Forms plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the fv_export_csv, reset_settings, save_settings, save_columns_settings, get_analytics_data, get_event_logs_data, delete_submissions, and get_submissions functions in all versions up to, and including, 1.4.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform multiple unauthorized actions. NOTE: This vulnerability is partially fixed in version 1.4.12. |
- 详情 |
-
-
-
- f25949e50ddec6eadba7ec6f3059d692 |
- CVE-2024-45107 |
- 2024-09-05 09:15:03 |
- Acrobat Reader versions 20.005.30636, 24.002.20964, 24.001.30123, 24.002.20991 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
- 详情 |
-
-
-
- df7cac17a06de699bf104c64cba85871 |
- CVE-2024-6835 |
- 2024-09-05 07:15:02 |
- The Ivory Search – WordPress Search Plugin plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 5.5.6 via the ajax_load_posts function. This makes it possible for unauthenticated attackers to extract text data from password-protected posts using the boolean-based attack on the AJAX search form |
- 详情 |
-
-
-
- 1f08b620eef0fbdcfe792ed5e917e8d4 |
- CVE-2024-6846 |
- 2024-09-05 06:15:03 |
- The Chatbot with ChatGPT WordPress plugin before 2.4.5 does not validate access on some REST routes, allowing for an unauthenticated user to purge error and chat logs |
- 详情 |
-
-
-
- c8d7a97613cda1d8609a4939062f1ac2 |
- CVE-2024-8178 |
- 2024-09-05 05:15:13 |
- The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host. |
- 详情 |
-
-
-
- b95d09d924b393a77616f0fc9fd596ea |
- CVE-2024-45063 |
- 2024-09-05 05:15:13 |
- The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host. |
- 详情 |
-
-