| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-9747 | Tungsten Automation Power PDF PSD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Tungsten Automation | Power PDF | 高危 | - | 2024-11-22 21:01:10 | Deep Dive |
| CVE-2024-9740 | Tungsten Automation Power PDF BMP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Tungsten Automation | Power PDF | 高危 | - | 2024-11-22 21:01:06 | Deep Dive |
| CVE-2024-9742 | Tungsten Automation Power PDF PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability | Tungsten Automation | Power PDF | 高危 | - | 2024-11-22 21:01:01 | Deep Dive |
| CVE-2024-9738 | Tungsten Automation Power PDF PDF File Parsing Memory Corruption Remote Code Execution Vulnerability | Tungsten Automation | Power PDF | 高危 | - | 2024-11-22 21:00:57 | Deep Dive |
| CVE-2024-9749 | Tungsten Automation Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Tungsten Automation | Power PDF | 高危 | - | 2024-11-22 21:00:53 | Deep Dive |
| CVE-2024-9748 | Tungsten Automation Power PDF XPS File Parsing Use-After-Free Remote Code Execution Vulnerability | Tungsten Automation | Power PDF | 高危 | - | 2024-11-22 21:00:49 | Deep Dive |
| CVE-2024-9743 | Tungsten Automation Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability | Tungsten Automation | Power PDF | 高危 | - | 2024-11-22 21:00:44 | Deep Dive |
| CVE-2024-9732 | Tungsten Automation Power PDF XPS File Parsing Use-After-Free Remote Code Execution Vulnerability | Tungsten Automation | Power PDF | 高危 | - | 2024-11-22 21:00:40 | Deep Dive |
| CVE-2023-4639 | Undertow: cookie smuggling/spoofing | Red Hat | Migration Toolkit for Runtimes 1 on RHEL 8 | High | 7.4 | 2024-11-17 10:21:45 | Deep Dive |
| CVE-2024-6068 | Input Validation Vulnerability exists in Arena® Input Analyzer | Rockwell Automation | Arena Input Analyzer | High | 7.3 | 2024-11-14 16:22:04 | Deep Dive |
| CVE-2024-9186 | Automation By Autonami < 3.3.0 - Unauthenticated SQLi | Unknown | Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit | - | - | 2024-11-14 06:00:11 | Deep Dive |
| CVE-2024-10945 | FactoryTalk® Updater Local Privilege Escalation | Rockwell Automation | FactoryTalk Updater | High | 7.3 | 2024-11-12 17:06:44 | Deep Dive |
| CVE-2024-10944 | FactoryTalk® Updater Remote Code Execution | Rockwell Automation | FactoryTalk Updater | High | 8.4 | 2024-11-12 17:03:27 | Deep Dive |
| CVE-2024-10943 | FactoryTalk® Updater Authentication Bypass | Rockwell Automation | FactoryTalk Updater | Critical | 9.1 | 2024-11-12 16:57:32 | Deep Dive |
| CVE-2024-37365 | FactoryTalk View ME Remote Code Execution Vulnerability via Project Save Path | Rockwell Automation | FactoryTalk View Machine Edition | High | 7.3 | 2024-11-12 14:52:56 | Deep Dive |
| CVE-2024-11079 | Ansible-core: unsafe tagging bypass via hostvars object in ansible-core | - | - | Medium | 5.5 | 2024-11-11 23:32:56 | Deep Dive |
| CVE-2023-1932 | Hibernate-validator: rendering of invalid html with safehtml leads to html injection and xss | Red Hat | A-MQ Clients 2 | Medium | 6.1 | 2024-11-07 10:00:52 | Deep Dive |
| CVE-2024-10947 | Guangzhou Tuchuang Computer Software Development Interlib Library Cluster Automation Management System BatchOrder sql injection | Guangzhou Tuchuang Computer Software Development | Interlib Library Cluster Automation Management System | Medium | 4.7 | 2024-11-07 03:31:11 | Deep Dive |
| CVE-2024-10946 | Guangzhou Tuchuang Computer Software Development Interlib Library Cluster Automation Management System SysLib sql injection | Guangzhou Tuchuang Computer Software Development | Interlib Library Cluster Automation Management System | Medium | 4.7 | 2024-11-07 03:31:07 | Deep Dive |
| CVE-2024-9902 | Ansible-core: ansible-core user may read/write unauthorized content | - | - | Medium | 6.3 | 2024-11-06 09:56:55 | Deep Dive |