Vulnerabilities (CVE)

Total 344222 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-38263 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-09-13 N/A 7.5 HIGH
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38260 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-09-13 N/A 8.8 HIGH
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43454 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-09-13 N/A 7.1 HIGH
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43455 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-09-13 N/A 9.8 CRITICAL
Windows Remote Desktop Licensing Service Spoofing Vulnerability
CVE-2024-43464 1 Microsoft 1 Sharepoint Server 2024-09-13 N/A 7.2 HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-43465 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-09-13 N/A 7.8 HIGH
Microsoft Excel Elevation of Privilege Vulnerability
CVE-2024-43466 1 Microsoft 1 Sharepoint Server 2024-09-13 N/A 7.5 HIGH
Microsoft SharePoint Server Denial of Service Vulnerability
CVE-2024-43475 1 Microsoft 1 Windows Server 2008 2024-09-13 N/A 7.3 HIGH
Microsoft Windows Admin Center Information Disclosure Vulnerability
CVE-2024-7144 1 Crocoblock 1 Jetelements 2024-09-13 N/A 5.4 MEDIUM
The JetElements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' and 'slide_id' parameters in all versions up to, and including, 2.6.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2024-7145 1 Crocoblock 1 Jetelements 2024-09-13 N/A 8.8 HIGH
The JetElements plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.6.20 via the 'progress_type' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CVE-2024-43476 1 Microsoft 1 Dynamics 365 2024-09-13 N/A 5.4 MEDIUM
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2024-43479 1 Microsoft 1 Power Automate 2024-09-13 N/A 8.5 HIGH
Microsoft Power Automate Desktop Remote Code Execution Vulnerability
CVE-2023-3408 1 Bricksbuilder 1 Bricks 2024-09-13 N/A 4.3 MEDIUM
The Bricks theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.1. This is due to missing or incorrect nonce validation on the 'save_settings' function. This makes it possible for unauthenticated attackers to modify the theme's settings, including enabling a setting which allows lower-privileged users such as contributors to perform code execution, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2024-8639 1 Google 2 Android, Chrome 2024-09-13 N/A 8.8 HIGH
Use after free in Autofill in Google Chrome on Android prior to 128.0.6613.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-8638 1 Google 1 Chrome 2024-09-13 N/A 8.8 HIGH
Type Confusion in V8 in Google Chrome prior to 128.0.6613.137 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-8637 1 Google 2 Android, Chrome 2024-09-13 N/A 8.8 HIGH
Use after free in Media Router in Google Chrome on Android prior to 128.0.6613.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-8636 1 Google 1 Chrome 2024-09-13 N/A 8.8 HIGH
Heap buffer overflow in Skia in Google Chrome prior to 128.0.6613.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-3409 1 Bricksbuilder 1 Bricks 2024-09-13 N/A 4.3 MEDIUM
The Bricks theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.1. This is due to missing or incorrect nonce validation on the 'reset_settings' function. This makes it possible for unauthenticated attackers to reset the theme's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2024-43335 1 Cyberchimps 1 Responsive Blocks 2024-09-13 N/A 5.4 MEDIUM
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CyberChimps Responsive Blocks – WordPress Gutenberg Blocks allows Stored XSS.This issue affects Responsive Blocks – WordPress Gutenberg Blocks: from n/a through 1.8.8.
CVE-2024-43342 1 Bdthemes 1 Ultimate Store Kit 2024-09-13 N/A 5.4 MEDIUM
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BdThemes Ultimate Store Kit Elementor Addons allows Stored XSS.This issue affects Ultimate Store Kit Elementor Addons: from n/a through 1.6.4.