Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.1

    MEDIUM
    CVE-2018-11350

    An issue was discovered in Jirafeau before 3.4.1. The file "search by name" form is affected by one Cross-Site Scripting vulnerability via the name parameter.... Read more

    Affected Products : jirafeau
    • Published: Jul. 07, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-11349

    The administration panel of Jirafeau before 3.4.1 is vulnerable to three CSRF attacks on search functionalities: search_by_name, search_by_hash, and search_link.... Read more

    Affected Products : jirafeau
    • Published: Jul. 07, 2018
    • Modified: Nov. 21, 2024
  • 5.4

    MEDIUM
    CVE-2018-11348

    Two XSS vulnerabilities are located in the profile edition page of the user panel of the YunoHost 2.7.2 through 2.7.14 web application. By injecting a JavaScript payload, these flaws could be used to manipulate a user's session.... Read more

    Affected Products : yunohost
    • Published: Dec. 04, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-11347

    The YunoHost 2.7.2 through 2.7.14 web application is affected by one HTTP Response Header Injection. This flaw allows an attacker to inject, into the response from the server, one or several HTTP Header. It requires an interaction with the user to send hi... Read more

    Affected Products : yunohost
    • Published: Dec. 04, 2018
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2018-11346

    An insecure direct object reference vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows the ability to reference the "download_sys_settings" action and then specify files arbitrarily throughout the system via the act parameter.... Read more

    Affected Products : as6202t_firmware as6202t
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-11345

    An unrestricted file upload vulnerability in upload.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data via the POST parameter filename. This can be used to place attacker controlled code on the file system that can then be exec... Read more

    Affected Products : as6202t_firmware as6202t
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2018-11344

    A path traversal vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to arbitrarily specify a file on the system to download via the file1 parameter.... Read more

    Affected Products : as6202t_firmware as6202t
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
  • 5.4

    MEDIUM
    CVE-2018-11343

    A persistent cross site scripting vulnerability in playlistmanger.cgi in the ASUSTOR SoundsGood application allows attackers to store cross site scripting payloads via the 'playlist' POST parameter.... Read more

    Affected Products : soundsgood
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2018-11342

    A path traversal vulnerability in fileExplorer.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to arbitrarily specify a path to a file on the system to create folders via the dest_folder parameter.... Read more

    Affected Products : as6202t_firmware as6202t
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2018-11341

    Directory traversal in importuser.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to navigate the file system via the filename parameter.... Read more

    Affected Products : as6202t_firmware as6202t
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
  • 9.0

    HIGH
    CVE-2018-11340

    An unrestricted file upload vulnerability in importuser.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data to a specified filename. This can be used to place attacker controlled code on the file system that is then executed.... Read more

    Affected Products : as6202t_firmware as6202t
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2018-11339

    An XSS issue was discovered in Frappe ERPNext v11.x.x-develop b1036e5 via a comment.... Read more

    Affected Products : erpnext
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-11338

    Intuit Lacerte 2017 for Windows in a client/server environment transfers the entire customer list in cleartext over SMB, which allows attackers to (1) obtain sensitive information by sniffing the network or (2) conduct man-in-the-middle (MITM) attacks via... Read more

    Affected Products : lacerte
    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-11335

    GVToken Genesis Vision (GVT) is a smart contract running on Ethereum. The mint function has an integer overflow that allows minted tokens to be arbitrarily retrieved by the contract owner.... Read more

    Affected Products : gvtoken
    • Published: Jul. 04, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-11334

    Windscribe 1.81 creates a named pipe with a NULL DACL that allows Everyone users to gain privileges or cause a denial of service via \\.\pipe\WindscribeService.... Read more

    Affected Products : windscribe
    • Published: May. 23, 2018
    • Modified: Nov. 21, 2024
  • 4.8

    MEDIUM
    CVE-2018-11332

    Stored cross-site scripting (XSS) vulnerability in the "Site Name" field found in the "site" tab under configurations in ClipperCMS 1.3.3 allows remote attackers to inject arbitrary web script or HTML via a crafted site name to the manager/processors/save... Read more

    Affected Products : clippercms
    • Published: May. 24, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-11331

    An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.... Read more

    Affected Products : pluck
    • Published: May. 21, 2018
    • Modified: Nov. 21, 2024
  • 4.8

    MEDIUM
    CVE-2018-11330

    An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.... Read more

    Affected Products : pluck
    • Published: May. 21, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-11329

    The DrugDealer function of a smart contract implementation for Ether Cartel, an Ethereum game, allows attackers to take over the contract's ownership, aka ceoAnyone. After that, all the digital assets (including Ether balance and tokens) might be manipula... Read more

    Affected Products : ether_cartel
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
  • 4.7

    MEDIUM
    CVE-2018-11328

    An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could resu... Read more

    Affected Products : joomla\!
    • Published: May. 22, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 293947 Results