CVE-2024-9520

CVE-2024-9520

Título es
CVE-2024-9520

Jue, 10/10/2024 – 03:15

Tipo
CWE-862

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-9520

Descripción en
The UserPlus plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.0. This makes it possible for authenticated attackers with subscriber-level permissions or above, to add, modify, or delete user meta and plugin options.

10/10/2024
10/10/2024
Vector CVSS:3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Gravedad 3.1 (CVSS 3.1 Base Score)
6.30

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
MEDIUM

Enviar en el boletín
Off

CVE-2024-8264

CVE-2024-8264

Título es
CVE-2024-8264

Mié, 09/10/2024 – 23:15

Tipo
CWE-532

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-8264

Descripción en
Fortra's Robot Schedule Enterprise Agent prior to version 3.05 writes FTP username and password information to the agent log file when detailed logging is enabled.

10/10/2024
10/10/2024
Vector CVSS:3.1
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Gravedad 3.1 (CVSS 3.1 Base Score)
5.50

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
MEDIUM

Enviar en el boletín
Off

CVE-2024-48933

CVE-2024-48933

Título es
CVE-2024-48933

Mié, 09/10/2024 – 23:15

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-48933

Descripción en
A cross-site scripting (XSS) vulnerability in LemonLDAP::NG before 2.19.3 allows remote attackers to inject arbitrary web script or HTML into the login page via a username if userControl has been set to a non-default value that allows special HTML characters.

10/10/2024
10/10/2024
Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Enviar en el boletín
Off

CVE-2024-48942

CVE-2024-48942

Título es
CVE-2024-48942

Jue, 10/10/2024 – 00:15

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-48942

Descripción en
The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to easily brute-force the 2FA PIN via the plugins/servlet/twofactor/public/pinvalidation endpoint. The last 30 and the next 30 tokens are valid.

10/10/2024
10/10/2024
Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Enviar en el boletín
Off

CVE-2024-48941

CVE-2024-48941

Título es
CVE-2024-48941

Jue, 10/10/2024 – 00:15

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-48941

Descripción en
The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to bypass 2FA by interacting with the /rest endpoint of Jira, Confluence, or Bitbucket. In the default configuration, /rest is allowlisted.

10/10/2024
10/10/2024
Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Enviar en el boletín
Off

CVE-2024-48949

CVE-2024-48949

Título es
CVE-2024-48949

Jue, 10/10/2024 – 01:15

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-48949

Descripción en
The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation.

10/10/2024
10/10/2024
Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Enviar en el boletín
Off

CVE-2024-38815

CVE-2024-38815

Título es
CVE-2024-38815

Mié, 09/10/2024 – 20:15

Tipo
CWE-79

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-38815

Descripción en
VMware NSX contains a content spoofing vulnerability. 

An unauthenticated malicious actor may be able to craft a URL and redirect a victim to an attacker controlled domain leading to sensitive information disclosure.

09/10/2024
09/10/2024
Vector CVSS:3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Gravedad 3.1 (CVSS 3.1 Base Score)
4.30

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
MEDIUM

Enviar en el boletín
Off

CVE-2024-30118

CVE-2024-30118

Título es
CVE-2024-30118

Mié, 09/10/2024 – 20:15

Tipo
CWE-200

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-30118

Descripción en
HCL Connections is vulnerable to an information disclosure vulnerability which could allow a user to obtain sensitive information they are not entitled to because of improperly handling the request data.

09/10/2024
09/10/2024
Vector CVSS:3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N

Gravedad 3.1 (CVSS 3.1 Base Score)
3.50

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
LOW

Enviar en el boletín
Off

CVE-2024-39516

CVE-2024-39516

Título es
CVE-2024-39516

Mié, 09/10/2024 – 20:15

Tipo
CWE-125

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-39516

Descripción en
An Out-of-Bounds Read vulnerability in

the routing protocol daemon (rpd) of

Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

This issue only affects systems with BGP traceoptions enabled. Systems without BGP traceoptions enabled are not affected by this issue.

This issue affects iBGP and eBGP with

any address family

configured.

This issue affects:

Junos OS: 

* All versions before 21.4R3-S8,
* 22.2 before 22.2R3-S5, 
* 22.3 before 22.3R3-S4, 
* 22.4 before 22.4R3-S3, 
* 23.2 before 23.2R2-S2, 
* 23.4 before 23.4R2; 

Junos OS Evolved: 

* All versions before 21.4R3-S8-EVO, 
* 22.2-EVO before 22.2R3-S5-EVO, 
* 22.3-EVO before 22.3R3-S4-EVO, 
* 22.4-EVO before 22.4R3-S3-EVO, 
* 23.2-EVO before 23.2R2-S2-EVO, 
* 23.4-EVO before 23.4R2-EVO.

09/10/2024
09/10/2024
Vector CVSS:3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Gravedad 3.1 (CVSS 3.1 Base Score)
7.50

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
HIGH

Enviar en el boletín
Off

CVE-2024-39525

CVE-2024-39525

Título es
CVE-2024-39525

Mié, 09/10/2024 – 20:15

Tipo
CWE-755

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-39525

Descripción en
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

This issue only affects systems with BGP traceoptions enabled and

requires a BGP session to be already established.  Systems without BGP traceoptions enabled are not affected by this issue.

This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.

This issue affects:

Junos OS: 

* All versions before 21.2R3-S8, 
* from 21.4 before 21.4R3-S8, 
* from 22.2 before 22.2R3-S4, 
* from 22.3 before 22.3R3-S4,
* from 22.4 before 22.4R3-S3, 
* from 23.2 before 23.2R2-S1, 
* from 23.4 before 23.4R2; 

Junos OS Evolved: 

* All versions before 21.2R3-S8-EVO, 
* from 21.4-EVO before 21.4R3-S8-EVO, 
* from 22.2-EVO before 22.2R3-S4-EVO, 
* from 22.3-EVO before 22.3R3-S4-EVO,
* from 22.4-EVO before 22.4R3-S3-EVO, 
* from 23.2-EVO before 23.2R2-S1-EVO, 
* from 23.4-EVO before 23.4R2-EVO.

09/10/2024
09/10/2024
Vector CVSS:3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Gravedad 3.1 (CVSS 3.1 Base Score)
7.50

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
HIGH

Enviar en el boletín
Off