Latest CVE Feed
-
7.5
HIGHCVE-2024-54108
Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.... Read more
Affected Products : harmonyos- Published: Dec. 12, 2024
- Modified: Sep. 18, 2025
-
7.5
HIGHCVE-2024-54107
Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.... Read more
Affected Products : harmonyos- Published: Dec. 12, 2024
- Modified: Sep. 18, 2025
-
7.5
HIGHCVE-2024-54103
Vulnerability of improper access control in the album module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
Affected Products : harmonyos- Published: Dec. 12, 2024
- Modified: Sep. 18, 2025
-
7.1
HIGHCVE-2024-54099
File replacement vulnerability on some devices Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.... Read more
- Published: Dec. 12, 2024
- Modified: Sep. 18, 2025
-
6.2
MEDIUMCVE-2024-51525
Permission control vulnerability in the clipboard module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
Affected Products : harmonyos- Published: Nov. 05, 2024
- Modified: Sep. 18, 2025
-
6.2
MEDIUMCVE-2024-51516
Permission control vulnerability in the ability module Impact: Successful exploitation of this vulnerability may cause features to function abnormally.... Read more
Affected Products : harmonyos- Published: Nov. 05, 2024
- Modified: Sep. 18, 2025
-
5.5
MEDIUMCVE-2024-51513
Vulnerability of processes not being fully terminated in the VPN module Impact: Successful exploitation of this vulnerability will affect power consumption.... Read more
Affected Products : harmonyos- Published: Nov. 05, 2024
- Modified: Sep. 18, 2025
-
5.5
MEDIUMCVE-2024-45448
Page table protection configuration vulnerability in the trusted firmware module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
- Published: Sep. 04, 2024
- Modified: Sep. 18, 2025
-
7.5
HIGHCVE-2024-42039
Access control vulnerability in the SystemUI module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
- Published: Sep. 04, 2024
- Modified: Sep. 18, 2025
-
8.8
HIGHCVE-2024-42038
Vulnerability of PIN enhancement failures in the screen lock module Impact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.... Read more
- Published: Aug. 08, 2024
- Modified: Sep. 18, 2025
-
7.5
HIGHCVE-2024-42036
Access permission verification vulnerability in the Notepad module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
- Published: Aug. 08, 2024
- Modified: Sep. 18, 2025
-
8.4
HIGHCVE-2024-42035
Permission control vulnerability in the App Multiplier module Impact:Successful exploitation of this vulnerability may affect functionality and confidentiality.... Read more
- Published: Aug. 08, 2024
- Modified: Sep. 18, 2025
-
7.1
HIGHCVE-2024-42033
Access control vulnerability in the security verification module mpact: Successful exploitation of this vulnerability will affect integrity and confidentiality.... Read more
- Published: Aug. 08, 2024
- Modified: Sep. 18, 2025
-
5.5
MEDIUMCVE-2024-42032
Access permission verification vulnerability in the Contacts module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
- Published: Aug. 08, 2024
- Modified: Sep. 18, 2025
-
7.1
HIGHCVE-2024-39673
Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
- Published: Jul. 25, 2024
- Modified: Sep. 18, 2025
-
0.0
NACVE-2025-9083
The Ninja Forms WordPress plugin before 3.11.1 unserializes user input via form field, which could allow Unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog.... Read more
Affected Products :- Published: Sep. 18, 2025
- Modified: Sep. 18, 2025
- Vuln Type: Injection
-
0.0
NACVE-2025-8942
The WP Hotel Booking WordPress plugin before 2.2.3 lacks proper server-side validation for review ratings, allowing an attacker to manipulate the rating value (e.g., sending negative or out-of-range values) by intercepting and modifying requests.... Read more
Affected Products :- Published: Sep. 18, 2025
- Modified: Sep. 18, 2025
- Vuln Type: Injection
-
0.0
NACVE-2025-5305
The Password Reset with Code for WordPress REST API WordPress plugin before 0.0.17 does not use cryptographically sound algorithms to generate OTP codes, potentially leading to account takeovers.... Read more
Affected Products :- Published: Sep. 18, 2025
- Modified: Sep. 18, 2025
- Vuln Type: Cryptography
-
0.0
NACVE-2023-49565
The cbis_manager Podman container is vulnerable to remote command execution via the /api/plugins endpoint. Improper sanitization of the HTTP Headers X-FILENAME, X-PAGE, and X-FIELD allows for command injection. These headers are directly utilized within t... Read more
Affected Products :- Published: Sep. 18, 2025
- Modified: Sep. 18, 2025
- Vuln Type: Injection
-
0.0
NACVE-2023-49564
The CBIS/NCS Manager API is vulnerable to an authentication bypass. By sending a specially crafted HTTP header, an unauthenticated user can gain unauthorized access to API functions. This flaw allows attackers to reach restricted or sensitive endpoints of... Read more
Affected Products :- Published: Sep. 18, 2025
- Modified: Sep. 18, 2025
- Vuln Type: Authentication