News, Tips & Tricks
CVE statistics
Since yesterday
Last 7 days
Last 30 days
0
0
0
Since yesterday
Last 7 days
Last 30 days
0
0
0
Since yesterday
Last 7 days
Last 30 days
0
0
0


Vendors & Products Under Threat

Published during the last 30 days

Name # CVEs
linux_kernel linux_kernel 146
Wordpress Wordpress 66
Oracle Oracle 55
Microsoft Microsoft 45
Microsoft Microsoft 34
SourceCodester SourceCodester 32
IBM IBM 31
Tenda Tenda 29
Name # CVEs
wordpress_plugin wordpress_plugin 42
Linux Kernel Linux Kernel 18
Junos OS Evolved Junos OS Evolved 16
xwiki_platform xwiki_platform 10
portal_for_arcgis portal_for_arcgis 9
zeppelin zeppelin 9
Chrome Chrome 8
lunary lunary 7

Recent CVE reports we annotated

List of recently published CVE reports with a CVSS score above 6.0

ID CVSS Description
CVE-2024-32693 7.6 Cross-Site Request Forgery CSRF vulnerability in ValvePress Automatic.This issue affects Automatic: from na before 3.93.0. https://basefortify.eu/cve_reports/2024/04/cve-2024-32693.html
CVE-2024-32695 7.1 Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Marco Gasi Language Switcher for Transposh allows Reflected XSS.This issue affects Language Switcher for Transposh: from na through 1.5.9. https://basefortify.eu/cve_reports/2024/04/cve-2024-32695.html
CVE-2024-32697 6.5 Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in HelloAsso allows Stored XSS.This issue affects HelloAsso: from na through 1.1.5. https://basefortify.eu/cve_reports/2024/04/cve-2024-32697.html
CVE-2024-32694 7.1 Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Creative interactive media 3D FlipBook, PDF Viewer, PDF Embedder Real 3D FlipBook WordPress Plugin allows Reflected XSS.This issue affects 3D FlipBook, PDF Viewer, PDF Embedder Real 3D FlipBook WordPress Plugin: from na through 3.62. https://basefortify.eu/cve_reports/2024/04/cve-2024-32694.html
CVE-2024-32696 6.5 Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in QuantumCloud Infographic Maker iList allows Stored XSS.This issue affects Infographic Maker iList: from na through 4.6.6. https://basefortify.eu/cve_reports/2024/04/cve-2024-32696.html
CVE-2024-32698 6.5 Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Leevio Happy Addons for Elementor allows Stored XSS.This issue affects Happy Addons for Elementor: from na through 3.10.4. https://basefortify.eu/cve_reports/2024/04/cve-2024-32698.html
CVE-2024-32682 7.1 Missing Authorization vulnerability in BdThemes Prime Slider Addons For Elementor.This issue affects Prime Slider Addons For Elementor: from na through 3.13.2. https://basefortify.eu/cve_reports/2024/04/cve-2024-32682.html
CVE-2024-3645 6.4 The Essential Addons for Elementor Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugins Counter widget in all versions up to, and including, 5.8.11 due to insufficient input sanitization and output escaping on user supplied attributes such as title_html_tag. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. https://basefortify.eu/cve_reports/2024/04/cve-2024-3645.html
CVE-2024-32688 6.5 Missing Authorization vulnerability in Long Watch Studio MyRewards.This issue affects MyRewards: from na through 5.3.0. https://basefortify.eu/cve_reports/2024/04/cve-2024-32688.html
CVE-2024-1057 6.4 The ShopLentor WooCommerce Builder for Elementor Gutenberg 10 Modules All in One Solution formerly WooLentor plugin for WordPress is vulnerable to Stored CrossSite Scripting via the plugins wishsuite_button shortcode in all versions up to and including 281 due to insufficient input sanitization and output escaping on user supplied attributes like button_class This makes it possible for authenticated attackers with contributorlevel and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page https://basefortify.eu/cve_reports/2024/04/cve-2024-1057.html
CVE-2024-4020 8.8 A vulnerability was found in Tenda FH1206 12088155 and classified as critical This issue affects the function fromAddressNat of the file goformaddressNat The manipulation of the argument entrys leads to buffer overflow The attack may be initiated remotely The exploit has been disclosed to the public and may be used The associated identifier of this vulnerability is VDB261671 NOTE The vendor was contacted early about this disclosure but did not respond in any way https://basefortify.eu/cve_reports/2024/04/cve-2024-4020.html
CVE-2024-4014 6.4 The hCaptcha for WordPress plugin for WordPress is vulnerable to Stored CrossSite Scripting via the plugins cf7hcaptcha shortcode in all versions up to and including 400 due to insufficient input sanitization and output escaping on user supplied attributes This makes it possible for authenticated attackers with contributorlevel access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page https://basefortify.eu/cve_reports/2024/04/cve-2024-4014.html
CVE-2024-4019 6.3 A vulnerability classified as critical has been found in Byzoro Smart S80 Management Platform up to 20240411 Affected is an unknown function of the file importhtmlphp The manipulation of the argument sql leads to deserialization It is possible to launch the attack remotely The exploit has been disclosed to the public and may be used VDB261666 is the identifier assigned to this vulnerability NOTE The vendor was contacted early about this disclosure but did not respond in any way https://basefortify.eu/cve_reports/2024/04/cve-2024-4019.html
CVE-2023-27279 6.5 IBM Aspera Faspex 500 through 507 could allow a user to cause a denial of service due to missing API rate limiting IBM XForce ID 248533 https://basefortify.eu/cve_reports/2024/04/cve-2023-27279.html
CVE-2024-29968 7.7 An information disclosure vulnerability exists in Brocade SANnav before v231 and v230a when Brocade SANnav instances are configured in disaster recovery mode SQL Table names column names and SQL queries are collected in DR standby Supportsave This could allow authenticated users to access the database structure and its contents https://basefortify.eu/cve_reports/2024/04/cve-2024-29968.html
CVE-2024-23535 8.8 A Path Traversal vulnerability in web component of Ivanti Avalanche before 643 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM https://basefortify.eu/cve_reports/2024/04/cve-2024-23535.html
CVE-2024-29029 6.1 memos is a privacyfirst lightweight notetaking service In memos 0132 an SSRF vulnerability exists at the ogetimage that allows unauthenticated users to enumerate the internal network and retrieve images The response from the image request is then copied into the response of the current server request causing a reflected XSS vulnerability https://basefortify.eu/cve_reports/2024/04/cve-2024-29029.html
CVE-2024-27978 6.5 A Null Pointer Dereference vulnerability in WLAvalancheService component of Ivanti Avalanche before 643 allows an authenticated remote attacker to perform denial of service attacks https://basefortify.eu/cve_reports/2024/04/cve-2024-27978.html
CVE-2024-3600 7.2 The Poll Maker Best WordPress Poll Plugin plugin for WordPress is vulnerable to Stored CrossSite Scripting due to a missing capability check on the ays_poll_maker_quick_start AJAX action in addition to insufficient escaping and sanitization in all versions up to and including 518 This makes it possible for unauthenticated attackers to create quizzes and inject malicious web scripts into them that execute when a user visits the page https://basefortify.eu/cve_reports/2024/04/cve-2024-3600.html
CVE-2024-27975 8.8 An Useafterfree vulnerability in WLAvalancheService component of Ivanti Avalanche before 643 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM https://basefortify.eu/cve_reports/2024/04/cve-2024-27975.html
CVE-2024-32652 7.5 The adapter hononodeserver allows you to run your Hono application on Nodejs Prior to 1101 the application hangs when receiving a Host header with a value that hononodeserver cant handle well Invalid values are those that cannot be parsed by the URL as a hostname such as an empty string slashes and other strings The version 1101 includes the fix for this issue https://basefortify.eu/cve_reports/2024/04/cve-2024-32652.html
CVE-2024-31994 6.5 Mealie is a self hosted recipe manager and meal planner Prior to 140 an attacker can point the image request to an arbitrarily large file Mealie will attempt to retrieve this file in whole If it can be retrieved it may be stored on the file system in whole leading to possible disk consumption however the more likely scenario given resource limitations is that the container will OOM during file retrieval if the target file size is greater than the allocated memory of the container At best this can be used to force the container to infinitely restart due to OOM if so configured in dockercomposeyml or at worst this can be used to force the Mealie container to crash and remain offline In the event that the file can be retrieved the lack of rate limiting on this endpoint also permits an attacker to generate ongoing requests to any target of their choice potentially contributing to an externalfacing DoS attack This vulnerability is fixed in 140 https://basefortify.eu/cve_reports/2024/04/cve-2024-31994.html
CVE-2024-3560 6.4 The LearnPress WordPress LMS Plugin plugin for WordPress is vulnerable to Stored CrossSite Scripting via the _id value in all versions up to and including 4264 due to insufficient input sanitization and output escaping on user supplied attributes This makes it possible for authenticated attackers with contributorlevel access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page https://basefortify.eu/cve_reports/2024/04/cve-2024-3560.html
CVE-2024-24991 6.5 A Null Pointer Dereference vulnerability in WLAvalancheService component of Ivanti Avalanche before 643 allows an authenticated remote attacker to perform denial of service attacks https://basefortify.eu/cve_reports/2024/04/cve-2024-24991.html
CVE-2024-29957 7.5 When Brocade SANnav before v231 and v230a servers are configured in Disaster Recovery mode the encryption key is stored in the DR log files This could provide attackers with an additional lessprotected path to acquiring the encryption key https://basefortify.eu/cve_reports/2024/04/cve-2024-29957.html
CVE-2024-23531 7.5 An Integer Overflow vulnerability in WLInfoRailService component of Ivanti Avalanche before 643 allows an unauthenticated remote attacker to perform denial of service attacks In certain rare conditions this could also lead to reading content from memory https://basefortify.eu/cve_reports/2024/04/cve-2024-23531.html
CVE-2024-3654 6.3 An XSS vulnerability has been found in Teimas Globals Teixo version 14242stable This vulnerability could allow an attacker to send a specially crafted JavaScript payload via the seconds parameter in the programs URL resulting in a possible takeover of a registered users session https://basefortify.eu/cve_reports/2024/04/cve-2024-3654.html
CVE-2023-37400 7.8 IBM Aspera Faspex 500 through 507 could allow a local user to escalate their privileges due to insecure credential storage IBM XForce ID 259677 https://basefortify.eu/cve_reports/2024/04/cve-2023-37400.html
CVE-2024-29963 8.6 Brocade SANnav OVA before v231 and v230a contain hardcoded keys used by Docker to reach remote registries over TLS TLS connections with an exposed key allow an attacker to MITM the traffic Note Brocade SANnav doesnt have access to remote Docker registries https://basefortify.eu/cve_reports/2024/04/cve-2024-29963.html
CVE-2024-29965 6.8 In Brocade SANnav before v231 and v230a it is possible to back up the appliance from the web interface or the command line interface SSH The resulting backups are worldreadable A local attacker can recover backup files restore them to a new malicious appliance and retrieve the passwords of all the switches https://basefortify.eu/cve_reports/2024/04/cve-2024-29965.html
CVE-2024-24998 8.8 A Path Traversal vulnerability in web component of Ivanti Avalanche before 643 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM https://basefortify.eu/cve_reports/2024/04/cve-2024-24998.html
CVE-2024-3684 8.0 A server side request forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin access to the appliance when configuring the Artifacts Logs and Migrations Storage Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role This vulnerability affected all versions of GitHub Enterprise Server prior to 312 and was fixed in versions 3122 3118 31010 and 3913 This vulnerability was reported via the GitHub Bug Bounty program https://basefortify.eu/cve_reports/2024/04/cve-2024-3684.html
CVE-2024-31993 6.2 Mealie is a self hosted recipe manager and meal planner Prior to 140 the scrape_image function will retrieve an image based on a userprovided URL however the provided URL is not validated to point to an external location and does not have any enforced rate limiting The response from the Mealie server will also vary depending on whether or not the target file is an image is not an image or does not exist Additionally when a file is retrieved the file may remain stored on Mealies file system as originaljpg under the UUID of the recipe it was requested for If the attacker has access to an admin account eg the default changemeexamplecom this file can then be retrieved Note that if Mealie is running in a development setting this could be leveraged by an attacker to retrieve any file that the Mealie server had downloaded in this fashion without the need for administrator access This vulnerability is fixed in 140 https://basefortify.eu/cve_reports/2024/04/cve-2024-31993.html
CVE-2024-3598 6.4 The ElementsKit Pro plugin for WordPress is vulnerable to Stored CrossSite Scripting via the plugins Creative Button widget in all versions up to and including 360 due to insufficient input sanitization and output escaping on user supplied attributes This makes it possible for authenticated attackers with contributorlevel access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page https://basefortify.eu/cve_reports/2024/04/cve-2024-3598.html
CVE-2024-24999 8.8 A Path Traversal vulnerability in web component of Ivanti Avalanche before 643 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM https://basefortify.eu/cve_reports/2024/04/cve-2024-24999.html
CVE-2024-24995 8.8 A Race Condition TOCTOU vulnerability in web component of Ivanti Avalanche before 643 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM https://basefortify.eu/cve_reports/2024/04/cve-2024-24995.html
CVE-2024-24992 8.8 A Path Traversal vulnerability in web component of Ivanti Avalanche before 643 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM https://basefortify.eu/cve_reports/2024/04/cve-2024-24992.html
CVE-2024-3615 6.1 The Media Library Folders plugin for WordPress is vulnerable to Reflected CrossSite Scripting via the s parameter in all versions up to and including 820 due to insufficient input sanitization and output escaping This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link https://basefortify.eu/cve_reports/2024/04/cve-2024-3615.html
CVE-2024-29966 7.5 Brocade SANnav OVA before v231 and v230a contain hardcoded credentials in the documentation that appear as the appliances root password The vulnerability could allow an unauthenticated attacker full access to the Brocade SANnav appliance https://basefortify.eu/cve_reports/2024/04/cve-2024-29966.html
CVE-2024-29958 7.5 A vulnerability in Brocade SANnav before v231 and v230a prints the encryption key in the console when a privileged user executes the script to replace the Brocade SANnav Management Portal standby node This could provide attackers an additional less protected path to acquiring the encryption key https://basefortify.eu/cve_reports/2024/04/cve-2024-29958.html
CVE-2024-32038 9.8 Wazuh is a free and open source platform used for threat prevention detection and response There is a buffer overflow hazard in wazuhanalysisd when handling Unicode characters from Windows Eventchannel messages It impacts Wazuh Manager 380 and above This vulnerability is fixed in Wazuh Manager 472 https://basefortify.eu/cve_reports/2024/04/cve-2024-32038.html
CVE-2024-23532 7.5 An outofbounds Read vulnerability in WLAvalancheService component of Ivanti Avalanche before 643 allows an authenticated remote attacker to perform denial of service attacks In certain conditions this could also lead to remote code execution https://basefortify.eu/cve_reports/2024/04/cve-2024-23532.html
CVE-2024-29969 7.5 When a Brocade SANnav installation is upgraded from Brocade SANnav v222 to Brocade SANnav 230 TLSSSL weak message authentication code ciphers are added by default for port 18082 https://basefortify.eu/cve_reports/2024/04/cve-2024-29969.html
CVE-2024-4017 8.8 Improper Privilege Management vulnerability in BeyondTrust USeries Appliance on Windows 64 bit filesystem modules allows DLL SideLoadingThis issue affects USeries Appliance from 34 before 403 https://basefortify.eu/cve_reports/2024/04/cve-2024-4017.html
CVE-2024-23534 8.8 An Unrestricted Fileupload vulnerability in web component of Ivanti Avalanche before 643 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM https://basefortify.eu/cve_reports/2024/04/cve-2024-23534.html
CVE-2024-29960 7.5 In the Brocade SANnav server versions before v231 and v230a the SSH keys inside the OVA image are hardcoded and identical in the VM every time SANnav is installed Any Brocade SANnav VM based on the official OVA images is vulnerable to MITM over SSH An attacker can decrypt and compromise the SSH traffic to the SANnav appliance https://basefortify.eu/cve_reports/2024/04/cve-2024-29960.html
CVE-2024-1480 7.5 Unitronics Vision Standard line of controllers allow the Information Mode password to be retrieved without authentication https://basefortify.eu/cve_reports/2024/04/cve-2024-1480.html
CVE-2024-25000 8.8 A Path Traversal vulnerability in web component of Ivanti Avalanche before 643 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM https://basefortify.eu/cve_reports/2024/04/cve-2024-25000.html
CVE-2024-32478 6.9 Git Credential Manager GCM is a secure Git credential helper Prior to 250 the Debian package does not set root ownership on installed files This allows user 1001 on a multiuser system can replace binary and gain other users privileges This vulnerability is fixed in 250 https://basefortify.eu/cve_reports/2024/04/cve-2024-32478.html
CVE-2024-32650 7.5 Rustls is a modern TLS library written in Rust rustlsConnectionCommoncomplete_io could fall into an infinite loop based on network input When using a blocking rustls server if a client send a close_notify message immediately after client_hello the servers complete_io will get in an infinite loop This vulnerability is fixed in 0235 0224 and 02111 https://basefortify.eu/cve_reports/2024/04/cve-2024-32650.html

Get started using

How do you get started with BaseFortify?

Simply register a new account to access our free plan, which currently includes most of the application's features. After logging in, you can start adding your applications and operating systems to your list. For detailed instructions, refer to our guide page. BaseFortify will automatically match these with any known vulnerabilities. Although there's much more to explore in BaseFortify, the basics are straightforward and user-friendly. If you need assistance, or if you encounter any issues with the application, please don't hesitate to reach out to us at [email protected].

About

BaseFortify has been developed by Axxemble, besides which has also developed our ISMS Base27. It offers a ready-to-start solution to quickly have your information security in order. Base27 provides an online framework for information security that is tailored to your organisation and services. After implementation you are ready for an external audit! Our total solution puts you in complete control of your information security from day one.