Vulnerabilities (CVE)

Total 81958 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-7985 1 Fileorganizer 1 Fileorganizer 2024-11-08 N/A 8.8 HIGH
The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the "fileorganizer_ajax_handler" function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: The FileOrganizer Pro plugin must be installed and active to allow Subscriber+ users to upload files.
CVE-2024-38139 1 Microsoft 1 Dataverse 2024-11-08 N/A 8.8 HIGH
Improper authentication in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network.
CVE-2024-45085 1 Ibm 1 Websphere Application Server 2024-11-08 N/A 7.5 HIGH
IBM WebSphere Application Server 8.5 is vulnerable to a denial of service, under certain configurations, caused by an unexpected specially crafted request. A remote attacker could exploit this vulnerability to cause an error resulting in a denial of service.
CVE-2024-49340 1 Ibm 1 Watson Studio Local 2024-11-08 N/A 8.8 HIGH
IBM Watson Studio Local 1.2.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
CVE-2024-51661 1 Davidlingren 1 Media Library Assistant 2024-11-08 N/A 7.2 HIGH
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in David Lingren Media Library Assistant allows Command Injection.This issue affects Media Library Assistant: from n/a through 3.19.
CVE-2024-50129 1 Linux 1 Linux Kernel 2024-11-07 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: net: pse-pd: Fix out of bound for loop Adjust the loop limit to prevent out-of-bounds access when iterating over PI structures. The loop should not reach the index pcdev->nr_lines since we allocate exactly pcdev->nr_lines number of PI structures. This fix ensures proper bounds are maintained during iterations.
CVE-2024-51523 1 Huawei 1 Harmonyos 2024-11-07 N/A 7.5 HIGH
Information management vulnerability in the Gallery module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-38406 1 Qualcomm 88 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 85 more 2024-11-07 N/A 7.0 HIGH
Memory corruption while handling IOCTL calls in JPEG Encoder driver.
CVE-2024-38424 1 Qualcomm 238 Ar8035, Ar8035 Firmware, Fastconnect 6200 and 235 more 2024-11-07 N/A 7.8 HIGH
Memory corruption during GNSS HAL process initialization.
CVE-2024-38423 1 Qualcomm 412 205 Mobile Platform, 205 Mobile Platform Firmware, 215 Mobile Platform and 409 more 2024-11-07 N/A 7.8 HIGH
Memory corruption while processing GPU page table switch.
CVE-2024-38422 1 Qualcomm 536 205 Mobile Platform, 205 Mobile Platform Firmware, 215 Mobile Platform and 533 more 2024-11-07 N/A 7.8 HIGH
Memory corruption while processing voice packet with arbitrary data received from ADSP.
CVE-2024-38421 1 Qualcomm 154 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 7800 and 151 more 2024-11-07 N/A 7.8 HIGH
Memory corruption while processing GPU commands.
CVE-2024-38419 1 Qualcomm 296 Ar8035, Ar8035 Firmware, Csra6620 and 293 more 2024-11-07 N/A 7.8 HIGH
Memory corruption while invoking IOCTL calls from the use-space for HGSL memory node.
CVE-2024-38415 1 Qualcomm 356 215 Mobile Platform, 215 Mobile Platform Firmware, Ar8035 and 353 more 2024-11-07 N/A 7.8 HIGH
Memory corruption while handling session errors from firmware.
CVE-2024-38410 1 Qualcomm 50 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 47 more 2024-11-07 N/A 7.8 HIGH
Memory corruption while IOCLT is called when device is in invalid state and the WMI command buffer may be freed twice.
CVE-2024-38409 1 Qualcomm 50 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 47 more 2024-11-07 N/A 7.8 HIGH
Memory corruption while station LL statistic handling.
CVE-2024-38407 1 Qualcomm 88 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 85 more 2024-11-07 N/A 7.0 HIGH
Memory corruption while processing input parameters for any IOCTL call in the JPEG Encoder driver.
CVE-2024-33033 1 Qualcomm 56 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 53 more 2024-11-07 N/A 7.8 HIGH
Memory corruption while processing IOCTL calls to unmap the buffers.
CVE-2022-48991 1 Linux 1 Linux Kernel 2024-11-07 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths Any codepath that zaps page table entries must invoke MMU notifiers to ensure that secondary MMUs (like KVM) don't keep accessing pages which aren't mapped anymore. Secondary MMUs don't hold their own references to pages that are mirrored over, so failing to notify them can lead to page use-after-free. I'm marking this as addressing an issue introduced in commit f3f0e1d2150b ("khugepaged: add support of collapse for tmpfs/shmem pages"), but most of the security impact of this only came in commit 27e1f8273113 ("khugepaged: enable collapse pmd for pte-mapped THP"), which actually omitted flushes for the removal of present PTEs, not just for the removal of empty page tables.
CVE-2024-50005 1 Linux 1 Linux Kernel 2024-11-07 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: mac802154: Fix potential RCU dereference issue in mac802154_scan_worker In the `mac802154_scan_worker` function, the `scan_req->type` field was accessed after the RCU read-side critical section was unlocked. According to RCU usage rules, this is illegal and can lead to unpredictable behavior, such as accessing memory that has been updated or causing use-after-free issues. This possible bug was identified using a static analysis tool developed by myself, specifically designed to detect RCU-related issues. To address this, the `scan_req->type` value is now stored in a local variable `scan_req_type` while still within the RCU read-side critical section. The `scan_req_type` is then used after the RCU lock is released, ensuring that the type value is safely accessed without violating RCU rules.