CVE-2024-5932 – GiveWP – Donation Plugin and Fundraising Platform <= 3.14.1 - Unauthenticated PHP Object Injection to Remote Code Execution
https://notcve.org/view.php?id=CVE-2024-5932
The GiveWP Donation plugin and Fundraising Platform plugin for WordPress in all versions up to and including 3.14.1 is vulnerable to a PHP object injection (POI) flaw granting an unauthenticated attacker arbitrary code execution. • https://github.com/EQSTLab/CVE-2024-5932?tab=readme-ov-file https://github.com/0xb0mb3r/CVE-2024-5932-PoC https://github.com/EQSTLab/CVE-2024-5932 https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/includes/login-register.php#L235 https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/includes/process-donation.php#L420 https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/src/DonorDashboards/Tabs/EditProfileTab/AvatarRoute.php#L51 https://plugins.trac.wordpress • CWE-502: Deserialization of Untrusted Data •
CVE-2024-7899 – InnoCMS Backend edit code injection
https://notcve.org/view.php?id=CVE-2024-7899
The manipulation leads to code injection. ... Mittels Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. • https://github.com/DeepMountains/Mirage/blob/main/CVE15-1.md https://vuldb.com/?ctiid.274907 https://vuldb.com/?id.274907 https://vuldb.com/?submit.387268 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-7646
https://notcve.org/view.php?id=CVE-2024-7646
A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster. • https://github.com/UgOrange/CVE-2024-7646-poc https://github.com/r0binak/CVE-2024-7646 https://github.com/kubernetes/ingress-nginx/pull/11719 https://github.com/kubernetes/ingress-nginx/pull/11721 https://github.com/kubernetes/kubernetes/issues/126744 https://groups.google.com/g/kubernetes-security-announce/c/a1__cKjWkfA • CWE-20: Improper Input Validation •
CVE-2024-25008 – Ericsson RAN Compute and Site Controller 6610 - Improper Input Validation Vulnerability
https://notcve.org/view.php?id=CVE-2024-25008
Ericsson RAN Compute and Site Controller 6610 contains a vulnerability in the Control System where Improper Input Validation can lead to arbitrary code execution, for example to obtain a Linux Shell with the same privileges as the attacker. • https://www.ericsson.com/en/about-us/security/psirt/security-bulletin-ericsson-ran-compute-august-2024 • CWE-20: Improper Input Validation •
CVE-2024-42634
https://notcve.org/view.php?id=CVE-2024-42634
A Command Injection vulnerability exists in formWriteFacMac of the httpd binary in Tenda AC9 v15.03.06.42. As a result, attacker can execute OS commands with root privileges. • https://github.com/goldds96/Report/blob/main/Tenda/AC9/CI.md • CWE-94: Improper Control of Generation of Code ('Code Injection') •