Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.1

    MEDIUM
    CVE-2024-2857

    The Simple Buttons Creator WordPress plugin through 1.04 does not have any authorisation as well as CSRF in its add button function, allowing unauthenticated users to call them either directly or via CSRF attacks. Furthermore, due to the lack of sanitisat... Read more

    Affected Products : simple_buttons_creator
    • Published: Apr. 15, 2024
    • Modified: May. 08, 2025
  • 4.8

    MEDIUM
    CVE-2024-2836

    The Social Share, Social Login and Social Comments Plugin WordPress plugin before 7.13.64 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfilter... Read more

    • Published: Apr. 15, 2024
    • Modified: May. 08, 2025
  • 8.8

    HIGH
    CVE-2023-47353

    An issue in the com.oneed.dvr.service.DownloadFirmwareService component of IMOU GO v1.0.11 allows attackers to force the download of arbitrary files.... Read more

    Affected Products : imou_go
    • EPSS Score: %0.17
    • Published: Feb. 06, 2024
    • Modified: May. 08, 2025
  • 8.8

    HIGH
    CVE-2022-43416

    Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit where it can be executed and allows invoking Katalon with configurable arguments, allowing attackers able to control agent processes to invoke Katalon on ... Read more

    Affected Products : jenkins katalon
    • EPSS Score: %0.38
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 5.3

    MEDIUM
    CVE-2022-43414

    Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specif... Read more

    Affected Products : nunit
    • EPSS Score: %0.15
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 4.3

    MEDIUM
    CVE-2022-43413

    Jenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.... Read more

    Affected Products : job_import
    • EPSS Score: %0.13
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 5.3

    MEDIUM
    CVE-2022-43412

    Jenkins Generic Webhook Trigger Plugin 1.84.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid web... Read more

    Affected Products : generic_webhook_trigger
    • EPSS Score: %0.16
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 5.3

    MEDIUM
    CVE-2022-43411

    Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.... Read more

    Affected Products : gitlab
    • EPSS Score: %0.16
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 5.3

    MEDIUM
    CVE-2022-43410

    Jenkins Mercurial Plugin 1251.va_b_121f184902 and earlier provides information about which jobs were triggered or scheduled for polling through its webhook endpoint, including jobs the user has no permission to access.... Read more

    Affected Products : mercurial
    • EPSS Score: %0.11
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 5.4

    MEDIUM
    CVE-2022-43409

    Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers ... Read more

    Affected Products : pipeline\
    • EPSS Score: %3.09
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 6.5

    MEDIUM
    CVE-2022-43408

    Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting... Read more

    Affected Products : pipeline\
    • EPSS Score: %0.01
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 8.8

    HIGH
    CVE-2022-43407

    Jenkins Pipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the 'input' step, which is used for the URLs that process user interactions for the given 'input' step (proceed or abort) and ... Read more

    Affected Products : pipeline\
    • EPSS Score: %0.01
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 5.5

    MEDIUM
    CVE-2022-43283

    wasm2c v1.0.29 was discovered to contain an abort in CWriter::Write.... Read more

    Affected Products : wabt
    • EPSS Score: %0.03
    • Published: Oct. 28, 2022
    • Modified: May. 08, 2025
  • 7.1

    HIGH
    CVE-2022-43282

    wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallIndirectExpr->GetReturnCallDropKeepCount.... Read more

    Affected Products : wabt
    • EPSS Score: %0.04
    • Published: Oct. 28, 2022
    • Modified: May. 08, 2025
  • 7.8

    HIGH
    CVE-2022-43281

    wasm-interp v1.0.29 was discovered to contain a heap overflow via the component std::vector<wabt::Type, std::allocator<wabt::Type>>::size() at /bits/stl_vector.h.... Read more

    Affected Products : wasm
    • EPSS Score: %0.05
    • Published: Oct. 28, 2022
    • Modified: May. 08, 2025
  • 5.4

    MEDIUM
    CVE-2022-43185

    A stored cross-site scripting (XSS) vulnerability in the Configuration/Holidays module of Rukovoditel v3.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter.... Read more

    Affected Products : rukovoditel
    • EPSS Score: %4.81
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 9.8

    CRITICAL
    CVE-2022-43184

    D-Link DIR878 1.30B08 Hotfix_04 was discovered to contain a command injection vulnerability via the component /bin/proc.cgi.... Read more

    Affected Products : dir-878_firmware dir-878
    • EPSS Score: %1.53
    • Published: Oct. 19, 2022
    • Modified: May. 08, 2025
  • 5.4

    MEDIUM
    CVE-2022-43169

    A stored cross-site scripting (XSS) vulnerability in the Users Access Groups feature (/index.php?module=users_groups/users_groups) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected... Read more

    Affected Products : rukovoditel
    • EPSS Score: %6.37
    • Published: Oct. 28, 2022
    • Modified: May. 08, 2025
  • 9.8

    CRITICAL
    CVE-2022-43168

    Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the reports_id parameter.... Read more

    Affected Products : rukovoditel
    • EPSS Score: %0.32
    • Published: Oct. 28, 2022
    • Modified: May. 08, 2025
  • 5.4

    MEDIUM
    CVE-2022-43167

    A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into t... Read more

    Affected Products : rukovoditel
    • EPSS Score: %7.09
    • Published: Oct. 28, 2022
    • Modified: May. 08, 2025
Showing 20 of 291638 Results