Latest critical severity Vulnerabilities

A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Lo...
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V3.0). The affected device contains hard coded password which is used for the privileged system user `root` and for the boot load...
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V3.0). The affected device contains undocumented users and credentials. An attacker could misuse the credentials to compromise th...
A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Lo...
A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Lo...
A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.5). The affected systems allow the upload of arbitrary files of any unauthenticated user. An attacker could leverage this v...
File upload vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform
### Impact When opening a form in Valtimo, the access token (JWT) of the user is exposed to `api.form.io` via the the `x-jwt-token` header. An attacker can retrieve personal information from this toke...
npm/@valtimo/components>=11.2.0<11.2.2
npm/@valtimo/components>=11.0.0<11.1.6
npm/@valtimo/components<10.8.4
@valtimo/components exposes access token to form.io
npm/@valtimo/components>=11.2.0<11.2.2
npm/@valtimo/components>=11.0.0<11.1.6
npm/@valtimo/components<10.8.4
Authentication Bypass when using using older password hashes
Cacti command injection in cmd_realtime.php
## Description `llama-cpp-python` depends on class `Llama` in `llama.py` to load `.gguf` llama.cpp or Latency Machine Learning Models. The `__init__` constructor built in the `Llama` takes several pa...
pip/llama-cpp-python>=0.2.30<=0.2.71
Cacti RCE vulnerability when importing packages
SQL Injection in School ERP Pro+Responsive by AROX SOLUTION
Unrestricted Upload of File with Dangerous Type vulnerability on Cockpit CMS from Agentejo
Improper authentication in YMS VIS Pro
WordPress WP Photo Album Plus plugin <= 8.7.01.001 - Unauth. Arbitrary File Upload vulnerability
WordPress canvasio3D Light plugin <= 2.5.0 - Arbitrary File Upload vulnerability
WordPress Pk Favicon Manager plugin <= 2.1 - Arbitrary File Upload vulnerability
WordPress AI Engine plugin <= 2.2.63 - Auth. Arbitrary File Upload vulnerability
WordPress Z-Downloads plugin <= 1.11.3 - Auth. Arbitrary File Upload vulnerability
Due to an unsafe de-serialization method used by the Veeam Service Provider Console(VSPC) server in communication between the management agent and its components, under certain conditions, it is poss...
Kognetiks Chatbot for WordPress <= 1.9.9 - Unauthenticated Arbitrary File Upload via chatbot_chatgpt_upload_file_to_assistant Function
Hotel Booking Lite <= 4.11.1 - Unauthenticated PHP Object Injection
llama-cpp-python vulnerable to Remote Code Execution by Server-Side Template Injection in Model Metadata
pip/llama-cpp-python>=0.2.30<=0.2.71
### Description: A Stored Blind Cross-Site Scripting (XSS) vulnerability has been identified in the Failed Login Attempts Logging Feature of the Froxlor Application. Stored Blind XSS occurs when user...
composer/froxlor/froxlor<2.1.9
### Summary The latest version of lobe-chat(by now v0.141.2) has an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet serv...
npm/@lobehub/chat<=0.150.5
Froxlor Vulnerable to Blind XSS Leading to Froxlor Application Compromise
composer/froxlor/froxlor<2.1.9
lobe-chat `/api/proxy` endpoint Server-Side Request Forgery vulnerability
npm/@lobehub/chat<=0.150.5
LearnPress – WordPress LMS Plugin <= 4.2.6.5 - Unauthenticated Time-Based SQL Injection
IBM Security Guardium command injection
IBM Security Guardium<=11.3
IBM Security Guardium<=11.4
IBM Security Guardium<=11.5
IBM Security Guardium<=12.0
### Overview Path Traversal Vulnerability via File Uploads in Genie ### Impact Any Genie OSS users running their own instance and relying on the filesystem to store file attachments submitted to th...
maven/com.netflix.genie:genie-web<4.3.18
Path Traversal vulnerability via File Uploads in Genie
maven/com.netflix.genie:genie-web<4.3.18
Last Viewed Posts by WPBeginner <= 1.0.0 - Unauthenticated PHP Object Injection
Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts
**Important: Exploiting this vulnerability requires the attacker to have access to your Frigate instance, which means they could also just delete all of your recordings or perform any other action. If...
pip/frigate<0.13.2
CyberPower PowerPanel Enterprise Missing Authentication
In Frigate, Malicious Long Unicode filenames may cause a Multiple Application-level Denial of Service
pip/frigate<0.13.2
SolarWinds ARM Deserialization of Untrusted Data Remote Code Execution
The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied durin...
The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 1.7.13. This is due to the plugin not properly validating the path of...
The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'process' function in the 'startklarDropZoneUploadProcess' c...
The Build App Online plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.0.5. This is due to the 'eb_user_email_verification_key' default value is empty, an...
Delta Electronics DIAEnergie SQL Injection
Delta Electronics DIAEnergie Unauthenticated SQL Injection
In multiple locations, there is a possible bypass of health data permissions due to an improper input validation. This could lead to local escalation of privilege with no additional execution privileg...
Google Android
Tenda i21 formexeCommand stack-based overflow
Tenda i21 formWifiMacFilterSet stack-based overflow
Tenda i21 formWifiMacFilterGet stack-based overflow

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203