Latest high severity Vulnerabilities

WordPress ARForms Form Builder plugin <= 1.6.1 - Broken Access Control vulnerability
WordPress Rolo Slider plugin <= 1.0.9 - Broken Access Control vulnerability
WordPress Stockholm Core plugin <= 2.4.1 - Reflected Cross Site Scripting (XSS) vulnerability
Cross-Site Scripting Vulnerability in Lunar
VMware Avi Load Balancer updates address multiple vulnerabilities
The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied durin...
The PostgreSQL implementation in Brocade SANnav versions before 2.3.0a is vulnerable to an incorrect local authentication flaw. An attacker accessing the VM where the Brocade SANnav is installed can g...
(0Day) Maxon Cinema 4D SKP File Parsing Use-After-Free Remote Code Execution Vulnerability
Maxon Cinema 4D
D-Link DAP-2622 DDP Set Date-Time NTP Server Stack-based Buffer Overflow Remote Code Execution Vulnerability
D-Link DAP-2622
D-Link DAP-2622 DDP Firmware Upgrade Filename Stack-based Buffer Overflow Remote Code Execution Vulnerability
D-Link DAP-2622
D-Link DAP-2622 DDP Firmware Upgrade Server IPv6 Address Stack-based Buffer Overflow Remote Code Execution Vulnerability
D-Link DAP-2622
Bentley View FBX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Bentley View
NETGEAR CAX30S SSO Command Injection Remote Code Execution Vulnerability
NETGEAR CAX30S
Bentley View SKP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Bentley View
Bentley View SKP File Parsing Use-After-Free Remote Code Execution Vulnerability
Bentley View
(Pwn2Own) Triangle MicroWorks SCADA Data Gateway Restore Workspace Directory Traversal Remote Code Execution Vulnerability
Triangle MicroWorks SCADA Data Gateway
BMC Track-It! Unrestricted File Upload Remote Code Execution Vulnerability
BMC Track-It!
NETGEAR Multiple Routers httpd Stack-based Buffer Overflow Remote Code Execution Vulnerability
NETGEAR Multiple Routers
Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability
Linux kernel
Foxit PDF Reader transitionToState Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Reader
Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Reader
Foxit PDF Reader JPG2000 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Foxit PDF Reader
Foxit PDF Editor transitionToState Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Line Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor FileAttachment Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Squiggly Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Polygon Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor PolyLine Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Caret Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Ink Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Circle Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Square Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Text Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Highlight Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Underline Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor StrikeOut Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Editor Stamp Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor
Foxit PDF Reader Annotation Use of Uninitialized Variable Remote Code Execution Vulnerability
Foxit PDF Reader
Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Reader
Foxit PDF Reader Annotation Out-Of-Bounds Read Remote Code Execution Vulnerability
Foxit PDF Reader
Foxit PDF Reader Square Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Reader
NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability
NETGEAR R7800
Deno contains a permission escalation via open of privileged files with missing `--deny` flag
rust/deno<1.43.1
### Summary If PDF.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be ...
npm/react-pdf>=8.0.0<8.0.2
npm/react-pdf<7.7.3
An Improper Certificate Validation could allow a malicious actor with access to an adjacent network to take control of the system. Affected Products: UniFi Connect Application (Version 3.7.9 and...
Suricata 's http2 parser contains an improper compressed header handling can lead to resource starvation
react-pdf's PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF
npm/react-pdf>=8.0.0<8.0.2
npm/react-pdf<7.7.3
GLPI contains an authenticated SQL injection
GLPI contains an SQL injection through the saved searches
Minder's `HandleGithubWebhook` is susceptible to a denial of service attack from an untrusted HTTP request. The vulnerability exists before the request has been validated, and as such the request is s...
go/github.com/stacklok/minder<0.20240507.2061

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203