2024 Advisories Archive

Severity Date Published Date Updated Check Point Reference Source Industry Reference Description
High 12 Nov 2024 12 Nov 2024 CPAI-2024-1033 Microsoft CVE-2024-43629 CVE-2024-43629
Microsoft Windows DWM Core Library Elevation of Privilege (CVE-2024-43629)
High 12 Nov 2024 12 Nov 2024 CPAI-2024-1058 Microsoft CVE-2024-43642 CVE-2024-43642
Microsoft Windows SMB Denial of Service (CVE-2024-43642)
High 12 Nov 2024 12 Nov 2024 CPAI-2024-1032 Microsoft CVE-2024-43630 CVE-2024-43630
Microsoft Windows Kernel Elevation of Privilege (CVE-2024-43630)
High 12 Nov 2024 12 Nov 2024 CPAI-2024-1031 Microsoft CVE-2024-43623 CVE-2024-43623
Microsoft Windows NT OS Kernel Elevation of Privilege (CVE-2024-43623)
High 11 Nov 2024 11 Nov 2024 CPAI-2024-1022 SOC Security Scanner
High 11 Nov 2024 11 Nov 2024 CPAI-2024-1016 CVE-2024-45844
F5 BIG-IP Privilege Escalation (CVE-2024-45844)
Critical 15 Oct 2024 11 Nov 2024 CPAI-2024-0962 CVE-2024-8963
Ivanti Cloud Services Appliance Path Traversal (CVE-2024-8963)
Critical 10 Oct 2024 11 Nov 2024 CPAI-2024-0949 CVE-2024-9465
Palo Alto Networks Expedition SQL Injection (CVE-2024-9465)
Critical 27 Oct 2024 11 Nov 2024 CPAI-2020-4202 CVE-2020-12124
WAVLINK WN530H4 Command Injection (CVE-2020-12124)
Critical 1 Oct 2024 11 Nov 2024 CPAI-2024-0895 CVE-2024-47176
CVE-2024-47177
CUPS cups-browsed Remote Code Execution (CVE-2024-47176; CVE-2024-47177)
High 17 Sep 2024 11 Nov 2024 CPAI-2024-0831 CVE-2024-8190
Ivanti Cloud Services Appliance Command Injection (CVE-2024-8190)
High 9 Sep 2024 11 Nov 2024 CPAI-2024-0727 CVE-2024-37383
RoundCube Webmail Stored Cross-Site Scripting (CVE-2024-37383)
Critical 10 Nov 2024 10 Nov 2024 CPAI-2024-1034 CVE-2024-32238
H3C ER8300G2-X Information Disclosure (CVE-2024-32238)
High 10 Nov 2024 10 Nov 2024 CPAI-2024-1039 CVE-2024-34785
Ivanti Endpoint Manager SQL Injection (CVE-2024-34785)
Critical 10 Oct 2024 10 Nov 2024 CPAI-2024-0943 CVE-2024-5910
Palo Alto Networks Expedition Authentication Bypass (CVE-2024-5910)
Critical 5 Sep 2024 10 Nov 2024 CPAI-2024-0772 CVE-2024-6670
CVE-2024-6671
Progress Software WhatsUp Gold SQL Injection (CVE-2024-6670; CVE-2024-6671)
Critical 20 Aug 2024 10 Nov 2024 CPAI-2024-0711 CVE-2024-7120
Raisecom Devices Command Injection (CVE-2024-7120)
High 10 Jul 2024 10 Nov 2024 CPAI-2024-0560 CVE-2024-36991
Splunk Enterprise Path Traversal (CVE-2024-36991)
Critical 10 Jul 2024 10 Nov 2024 CPAI-2024-0559 CVE-2024-36401
OSGeo GeoServer Remote Code Execution (CVE-2024-36401)
Critical 20 Jun 2024 10 Nov 2024 CPAI-2024-0416 CVE-2024-23692
Rejetto HTTP File Server Server-Side Template Injection (CVE-2024-23692)
High 23 Jun 2024 10 Nov 2024 CPAI-2024-0408 CVE-2024-28995
SolarWinds Serv-U Directory Traversal (CVE-2024-28995)
Critical 17 Jun 2024 10 Nov 2024 CPAI-2024-0407 CVE-2024-27348
Apache HugeGraph Server Remote Code Execution (CVE-2024-27348)
Critical 23 May 2024 10 Nov 2024 CPAI-2024-0320 CVE-2024-32113
Apache OFBiz Path Traversal (CVE-2024-32113)
High 4 Feb 2024 10 Nov 2024 CPAI-2024-0035 CVE-2024-21893
Ivanti Server-Side Request Forgery (CVE-2024-21893)
Critical 15 Jan 2024 10 Nov 2024 CPAI-2023-1448 CVE-2023-41892
Craft CMS Remote Code Execution (CVE-2023-41892)
Critical 16 Sep 2024 7 Nov 2024 CPAI-2024-0797 CVE-2024-28987
SolarWinds Web Help Desk Authentication Bypass (CVE-2024-28987)
Critical 7 Aug 2024 7 Nov 2024 CPAI-2024-0663 CVE-2024-38856
Apache OFBiz Remote Code Execution (CVE-2024-38856)
Critical 6 Nov 2024 6 Nov 2024 CPAI-2024-1027 CVE-2024-4434
WordPress LearnPress Plugin SQL Injection (CVE-2024-4434)
Medium 6 Nov 2024 6 Nov 2024 CPAI-2024-1024 CVE-2024-6931
WordPress The Events Calendar Plugin Cross-Site Scripting (CVE-2024-6931)
High 6 Nov 2024 6 Nov 2024 CPAI-2024-1009 CVE-2024-35517
Netgear XR1000 Command Injection (CVE-2024-35517)
Medium 6 Nov 2024 6 Nov 2024 CPAI-2024-1008 CVE-2024-35520
Netgear R7000 Command Injection (CVE-2024-35520)
High 6 Nov 2024 6 Nov 2024 CPAI-2024-1005 CVE-2024-35518
CVE-2024-35519
CVE-2024-35522
Netgear EX Series Command Injection (CVE-2024-35518; CVE-2024-35519; CVE-2024-35522)
Critical 5 Nov 2024 5 Nov 2024 CPAI-2024-1042 CVE-2024-8956
PTZOptics PT30X Information Disclosure (CVE-2024-8956)
Critical 5 Nov 2024 5 Nov 2024 CPAI-2024-1041 CVE-2024-8957
PTZOptics PT30X Command Injection (CVE-2024-8957)
High 5 Nov 2024 5 Nov 2024 CPAI-2023-1922 CVE-2023-52755
Linux Kernel Out-of-Bounds Write (CVE-2023-52755)
Critical 5 Nov 2024 5 Nov 2024 CPAI-2018-2852 CVE-2018-16159
WordPress Codemenschen Gift Vouchers Plugin SQL Injection (CVE-2018-16159)
Critical 5 Nov 2024 5 Nov 2024 CPAI-2024-1036 CVE-2024-51567
CVE-2024-51568
CyberPanel Command Injection (CVE-2024-51567; CVE-2024-51568)
High 5 Nov 2024 5 Nov 2024 CPAI-2024-1010 CVE-2024-7591
Kemp Multiple Products Command Injection (CVE-2024-7591)
Critical 5 Nov 2024 5 Nov 2024 CPAI-2020-4207 CVE-2020-36708
WordPress Multiple Plugins Authentication Bypass (CVE-2020-36708)
Medium 5 Nov 2024 5 Nov 2024 CPAI-2022-2138 CVE-2022-4971
WordPress Sassy Social Share Plugin Cross-Site Scripting (CVE-2022-4971)
High 5 Nov 2024 5 Nov 2024 CPAI-2024-0929 Rapid7 AppSpider Security Scanner
High 5 Nov 2024 5 Nov 2024 CPAI-2024-0925 Fortinet Security Scanner
Critical 9 May 2024 5 Nov 2024 CPAI-2023-1693 CVE-2023-49606
Tinyproxy Use After Free (CVE-2023-49606)
Critical 24 Jun 2024 5 Nov 2024 CPAI-2022-1599 CVE-2022-40871
Dolibarr ERP CRM Remote Code Execution (CVE-2022-40871)
High 4 Nov 2024 4 Nov 2024 CPAI-2024-1030 CVE-2024-5010
Progress WhatsUp Gold Information Disclosure (CVE-2024-5010)
Critical 4 Nov 2024 4 Nov 2024 CPAI-2022-2139 CVE-2022-0342
Zyxel Usg40 Firmware Authentication Bypass (CVE-2022-0342)
High 4 Nov 2024 4 Nov 2024 CPAI-2024-0974 CVE-2024-42010
RoundCube Webmail Information Disclosure (CVE-2024-42010)
High 31 Oct 2024 4 Nov 2024 CPAI-2024-0967 CVE-2024-43363
Cacti Remote Code Execution (CVE-2024-43363)
High 3 Nov 2024 3 Nov 2024 CPAI-2024-1020 Greenbone Security Scanner
High 3 Nov 2024 3 Nov 2024 CPAI-2024-1003 CVE-2024-47949
JetBrains TeamCity Directory Traversal (CVE-2024-47949)
×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK