CVE-2024-6000 – FooEvents for WooCommerce <= 1.19.20 - Improper Authorization to (Contributor+) Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2024-6000
This makes it possible for authenticated attackers with contributor-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://help.fooevents.com/docs/topics/changelogs/fooevents-for-woocommerce https://www.wordfence.com/threat-intel/vulnerabilities/id/1080810b-ec9a-44fb-b4da-49b28646a441?source=cve • CWE-285: Improper Authorization •
CVE-2024-36600
https://notcve.org/view.php?id=CVE-2024-36600
Buffer Overflow Vulnerability in libcdio v2.1.0 allows an attacker to execute arbitrary code via a crafted ISO 9660 image file. • https://github.com/gashasbi/My-Reports/tree/main/CVE-2024-36600 • CWE-121: Stack-based Buffer Overflow •
CVE-2024-36598 – AEGON LIFE 1.0 Remote Code Execution
https://notcve.org/view.php?id=CVE-2024-36598
An arbitrary file upload vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary code via uploading a crafted image file. ... AEGON LIFE version 1.0 suffers from an unauthenticated remote code execution vulnerability. • https://github.com/keruenn/PoC-CVE-2024-36598 https://github.com/kaliankhe/CVE-Aslam-mahi/blob/9ec0572c68bfd3708a7d6e089181024131f4e927/vendors/projectworlds.in/AEGON%20LIFE%20v1.0%20Life%20Insurance%20Management%20System/CVE-2024-36598 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-32925
https://notcve.org/view.php?id=CVE-2024-32925
This could lead to remote code execution with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2024-06-01 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-32913
https://notcve.org/view.php?id=CVE-2024-32913
This could lead to remote code execution with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2024-06-01 • CWE-190: Integer Overflow or Wraparound •