Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.4

    MEDIUM
    CVE-2024-12042

    The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the profile picture upload functionality in all versions up to, and including, 4.16.4 due to insufficient file type valida... Read more

    Affected Products : mstore_api
    • Published: Dec. 13, 2024
    • Modified: May. 22, 2025
  • 9.8

    CRITICAL
    CVE-2024-31022

    An issue was discovered in CandyCMS version 1.0.0, allows remote attackers to execute arbitrary code via the install.php component.... Read more

    Affected Products : candycms candycms
    • Published: Apr. 08, 2024
    • Modified: May. 22, 2025
  • 7.2

    HIGH
    CVE-2024-9461

    The Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.16.6 via the cron_interval parameter. This is due to missing input validation... Read more

    Affected Products : total_upkeep
    • Published: Nov. 26, 2024
    • Modified: May. 22, 2025
  • 6.4

    MEDIUM
    CVE-2024-8486

    The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in the Modern Heading and Icon Picker widgets all versions up to, and including, 2.16.3 due to insufficient input s... Read more

    • Published: Oct. 05, 2024
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-41604

    Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that all... Read more

    Affected Products : zonealarm
    • Published: Sep. 27, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-40785

    Unsanitized input when setting a locale file leads to shell injection in mIPC camera firmware 5.3.1.2003161406. This allows an attacker to gain remote code execution on cameras running the firmware when a victim logs into a specially crafted mobile app.... Read more

    Affected Products : mipc_camera_firmware mipc_camera
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-40784

    Unlimited strcpy on user input when setting a locale file leads to stack buffer overflow in mIPC camera firmware 5.3.1.2003161406.... Read more

    Affected Products : mipc_camera_firmware mipc_camera
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 7.2

    HIGH
    CVE-2022-40353

    Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/up_booking.php.... Read more

    • Published: Sep. 27, 2022
    • Modified: May. 22, 2025
  • 7.2

    HIGH
    CVE-2022-40352

    Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_traveller.php.... Read more

    • Published: Sep. 27, 2022
    • Modified: May. 22, 2025
  • 4.8

    MEDIUM
    CVE-2022-3074

    The Slider Hero WordPress plugin before 8.4.4 does not escape the slider Name, which could allow high-privileged users to perform Cross-Site Scripting attacks.... Read more

    Affected Products : slider_hero
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 4.8

    MEDIUM
    CVE-2022-3070

    The Generate PDF WordPress plugin before 3.6 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.... Read more

    Affected Products : generate_pdf_using_contact_form_7
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 4.8

    MEDIUM
    CVE-2022-3069

    The WordLift WordPress plugin before 3.37.2 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.... Read more

    Affected Products : wordlift
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 6.5

    MEDIUM
    CVE-2022-3047

    Insufficient policy enforcement in Extensions API in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.... Read more

    Affected Products : fedora chrome edge_chromium
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-3046

    Use after free in Browser Tag in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.... Read more

    Affected Products : fedora chrome edge_chromium
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-3045

    Insufficient validation of untrusted input in V8 in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.... Read more

    Affected Products : fedora chrome edge_chromium
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 6.5

    MEDIUM
    CVE-2022-3044

    Inappropriate implementation in Site Isolation in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.... Read more

    Affected Products : fedora chrome edge_chromium
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-37209

    JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.... Read more

    Affected Products : jfinal_cms
    • Published: Sep. 27, 2022
    • Modified: May. 22, 2025
  • 7.4

    HIGH
    CVE-2022-37193

    Chipolo ONE Bluetooth tracker (2020) Chipolo iOS app version 4.13.0 is vulnerable to Incorrect Access Control. Chipolo devices suffer from access revocation evasion attacks once the malicious sharee obtains the access credentials.... Read more

    Affected Products : chipolo chipolo_one
    • Published: Sep. 27, 2022
    • Modified: May. 22, 2025
  • 10.0

    CRITICAL
    CVE-2022-32845

    This issue was addressed with improved checks. This issue is fixed in watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to break out of its sandbox.... Read more

    Affected Products : macos iphone_os watchos ipados
    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-31367

    Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.... Read more

    Affected Products : strapi
    • Published: Sep. 27, 2022
    • Modified: May. 22, 2025
Showing 20 of 292764 Results