Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2022-2852

    Use after free in FedCM in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.... Read more

    Affected Products : fedora chrome edge_chromium
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-22629

    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead... Read more

    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 9.8

    CRITICAL
    CVE-2022-0080

    mruby is vulnerable to Heap-based Buffer Overflow... Read more

    Affected Products : mruby
    • Published: Jan. 02, 2022
    • Modified: May. 22, 2025
  • 7.5

    HIGH
    CVE-2021-41819

    CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.... Read more

    • Published: Jan. 01, 2022
    • Modified: May. 22, 2025
  • 8.4

    HIGH
    CVE-2021-30337

    Possible use after free when process shell memory is freed using IOCTL call and process initialization is in progress in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, S... Read more

    • Published: Jan. 03, 2022
    • Modified: May. 22, 2025
  • 7.2

    HIGH
    CVE-2025-2257

    The Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.16.10 via the compression_level setting. This is due to the plugin using the ... Read more

    Affected Products : total_upkeep
    • Published: Mar. 26, 2025
    • Modified: May. 22, 2025
    • Vuln Type: Authentication
  • 6.4

    MEDIUM
    CVE-2024-9545

    The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's aux_contact_box and aux_gmaps shortcodes in all versions up to, and including, 2.16.4 due to insufficient input sanitizati... Read more

    • Published: Dec. 21, 2024
    • Modified: May. 22, 2025
  • 6.4

    MEDIUM
    CVE-2024-12588

    The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Staff widget in all versions up to, and including, 2.16.4 due to insufficient input sanitization and output escaping on us... Read more

    • Published: Dec. 21, 2024
    • Modified: May. 22, 2025
  • 5.4

    MEDIUM
    CVE-2024-12042

    The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the profile picture upload functionality in all versions up to, and including, 4.16.4 due to insufficient file type valida... Read more

    Affected Products : mstore_api
    • Published: Dec. 13, 2024
    • Modified: May. 22, 2025
  • 9.8

    CRITICAL
    CVE-2024-31022

    An issue was discovered in CandyCMS version 1.0.0, allows remote attackers to execute arbitrary code via the install.php component.... Read more

    Affected Products : candycms candycms
    • Published: Apr. 08, 2024
    • Modified: May. 22, 2025
  • 7.2

    HIGH
    CVE-2024-9461

    The Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.16.6 via the cron_interval parameter. This is due to missing input validation... Read more

    Affected Products : total_upkeep
    • Published: Nov. 26, 2024
    • Modified: May. 22, 2025
  • 6.4

    MEDIUM
    CVE-2024-8486

    The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in the Modern Heading and Icon Picker widgets all versions up to, and including, 2.16.3 due to insufficient input s... Read more

    • Published: Oct. 05, 2024
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-41604

    Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that all... Read more

    Affected Products : zonealarm
    • Published: Sep. 27, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-40785

    Unsanitized input when setting a locale file leads to shell injection in mIPC camera firmware 5.3.1.2003161406. This allows an attacker to gain remote code execution on cameras running the firmware when a victim logs into a specially crafted mobile app.... Read more

    Affected Products : mipc_camera_firmware mipc_camera
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-40784

    Unlimited strcpy on user input when setting a locale file leads to stack buffer overflow in mIPC camera firmware 5.3.1.2003161406.... Read more

    Affected Products : mipc_camera_firmware mipc_camera
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 7.2

    HIGH
    CVE-2022-40353

    Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/up_booking.php.... Read more

    • Published: Sep. 27, 2022
    • Modified: May. 22, 2025
  • 7.2

    HIGH
    CVE-2022-40352

    Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_traveller.php.... Read more

    • Published: Sep. 27, 2022
    • Modified: May. 22, 2025
  • 4.8

    MEDIUM
    CVE-2022-3074

    The Slider Hero WordPress plugin before 8.4.4 does not escape the slider Name, which could allow high-privileged users to perform Cross-Site Scripting attacks.... Read more

    Affected Products : slider_hero
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 4.8

    MEDIUM
    CVE-2022-3070

    The Generate PDF WordPress plugin before 3.6 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.... Read more

    Affected Products : generate_pdf_using_contact_form_7
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
  • 4.8

    MEDIUM
    CVE-2022-3069

    The WordLift WordPress plugin before 3.37.2 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.... Read more

    Affected Products : wordlift
    • Published: Sep. 26, 2022
    • Modified: May. 22, 2025
Showing 20 of 292772 Results