CVE ID | Published | Description | Score | Severity | |
---|---|---|---|---|---|
CVE-2024-5926 | 2024-06-30 00:00 +00:00 | Path Traversal: '\..\filename' in GitHub repository stitionai/devika prior to -.... |
9.1 |
CRITICAL |
|
CVE-2024-2386 | 2024-06-29 13:00 +00:00 | The WordPress Plugin for Google Maps – WP MAPS plugin for WordPress is vulnerable to SQL Injection... |
8.8 |
HIGH |
|
CVE-2024-6265 | 2024-06-29 04:33 +00:00 | The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for... |
9.8 |
CRITICAL |
|
CVE-2024-5827 | 2024-06-28 19:27 +00:00 | Vanna v0.3.4 is vulnerable to SQL injection in its DuckDB integration exposed to its Flask Web APIs.... File Inclusion |
9.8 |
CRITICAL |
|
CVE-2024-38371 | 2024-06-28 17:58 +00:00 | authentik is an open-source Identity Provider. Access restrictions assigned to an application were n... |
8.6 |
HIGH |
|
CVE-2024-37905 | 2024-06-28 17:09 +00:00 | authentik is an open-source Identity Provider that emphasizes flexibility and versatility. Authentik... Authorization problems |
8.8 |
HIGH |
|
CVE-2024-29039 | 2024-06-28 15:48 +00:00 | tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability all... |
9.1 |
CRITICAL |
|
CVE-2024-38521 | 2024-06-28 15:33 +00:00 | Hush Line is a free and open-source, anonymous-tip-line-as-a-service for organizations or individual... Cross-site Scripting |
8.8 |
HIGH |
|
CVE-2024-5736 | 2024-06-28 11:26 +00:00 | Server Side Request Forgery (SSRF) vulnerability in AdmirorFrames Joomla! extension in afGdStream.ph... Server-Side Request Forgery - SSRF |
8.2 |
HIGH |
|
CVE-2024-39349 | 2024-06-28 06:03 +00:00 | A vulnerability regarding buffer copy without checking size of input ('Classic Buffer Overflow') is ... Overflow |
9.8 |
CRITICAL |
|
CVE-2024-6071 | 2024-06-27 23:05 +00:00 | PTC Creo Elements/Direct License Server exposes a web interface which can be used by unauthenticated... Authorization problems |
10 |
CRITICAL |
|
CVE-2024-2882 | 2024-06-27 18:55 +00:00 | SDG Technologies PnPSCADA allows a remote attacker to attach various entities without requiring syst... Authorization problems |
9.3 |
CRITICAL |
|
CVE-2024-2973 | 2024-06-27 20:17 +00:00 | An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Sessio... |
10 |
CRITICAL |
|
CVE-2024-3330 | 2024-06-27 18:37 +00:00 | Vulnerability in Spotfire Spotfire Analyst, Spotfire Spotfire Server, Spotfire Spotfire for AWS Mark... |
9.9 |
CRITICAL |
|
CVE-2024-4578 | 2024-06-27 18:31 +00:00 | This Advisory describes an issue that impacts Arista Wireless Access Points. Any entity with the abi... Command Injection |
8.4 |
HIGH |