Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.5

    MEDIUM
    CVE-2024-9590

    The Category and Taxonomy Meta Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image meta field value in the 'wpaft_add_meta_textinput' function in versions up to, and including, 1.0.0 due to insufficient input sanitizatio... Read more

    Affected Products : category_and_taxonomy_meta_fields
    • Published: Oct. 22, 2024
    • Modified: Oct. 29, 2024
  • 9.8

    CRITICAL
    CVE-2024-50486

    Authentication Bypass Using an Alternate Path or Channel vulnerability in Acnoo Acnoo Flutter API allows Authentication Bypass.This issue affects Acnoo Flutter API: from n/a through 1.0.5.... Read more

    Affected Products : flutter_api
    • Published: Oct. 28, 2024
    • Modified: Oct. 29, 2024
  • 9.8

    CRITICAL
    CVE-2024-50450

    Improper Control of Generation of Code ('Code Injection') vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF) allows Code Injection.This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3.4.... Read more

    • Published: Oct. 28, 2024
    • Modified: Oct. 29, 2024
  • 7.2

    HIGH
    CVE-2024-50442

    Improper Restriction of XML External Entity Reference vulnerability in WP Royal Royal Elementor Addons allows XML Injection.This issue affects Royal Elementor Addons: from n/a through 1.3.980.... Read more

    Affected Products : royal_elementor_addons
    • Published: Oct. 28, 2024
    • Modified: Oct. 29, 2024
  • 5.5

    MEDIUM
    CVE-2024-9591

    The Category and Taxonomy Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_category_image' parameter in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attri... Read more

    Affected Products : category_and_taxonomy_image
    • Published: Oct. 22, 2024
    • Modified: Oct. 29, 2024
  • 8.8

    HIGH
    CVE-2024-50416

    Deserialization of Untrusted Data vulnerability in WPClever WPC Shop as a Customer for WooCommerce allows Object Injection.This issue affects WPC Shop as a Customer for WooCommerce: from n/a through 1.2.6.... Read more

    • Published: Oct. 28, 2024
    • Modified: Oct. 29, 2024
  • 5.5

    MEDIUM
    CVE-2024-49970

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Implement bounds check for stream encoder creation in DCN401 'stream_enc_regs' array is an array of dcn10_stream_enc_registers structures. The array is initialized with... Read more

    Affected Products : linux_kernel
    • Published: Oct. 21, 2024
    • Modified: Oct. 29, 2024
  • 6.5

    MEDIUM
    CVE-2024-49273

    Missing Authorization vulnerability in ProfileGrid User Profiles ProfileGrid.This issue affects ProfileGrid: from n/a through 5.9.3.... Read more

    Affected Products : profilegrid
    • Published: Oct. 21, 2024
    • Modified: Oct. 29, 2024
  • 9.1

    CRITICAL
    CVE-2024-47883

    The OpenRefine fork of the MIT Simile Butterfly server is a modular web application framework. The Butterfly framework uses the `java.net.URL` class to refer to (what are expected to be) local resource files, like images or templates. This works: "opening... Read more

    Affected Products : butterfly
    • Published: Oct. 24, 2024
    • Modified: Oct. 29, 2024
  • 10.0

    CRITICAL
    CVE-2024-42017

    An issue was discovered in Atos Eviden iCare 2.7.1 through 2.7.11. The application exposes a web interface locally. In the worst-case scenario, if the application is remotely accessible, it allows an attacker to execute arbitrary commands with system priv... Read more

    Affected Products :
    • Published: Sep. 30, 2024
    • Modified: Oct. 29, 2024
  • 4.0

    MEDIUM
    CVE-2024-30124

    HCL Sametime is impacted by insecure services in-use on the UIM client by default. An unused legacy REST service was enabled by default using the HTTP protocol. An attacker could potentially use this service endpoint maliciously.... Read more

    Affected Products : sametime
    • Published: Oct. 23, 2024
    • Modified: Oct. 29, 2024
  • 6.4

    MEDIUM
    CVE-2024-10189

    The Anchor Episodes Index (Spotify for Podcasters) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's anchor_episodes shortcode in all versions up to, and including, 2.1.10 due to insufficient input sanitization and output ... Read more

    Affected Products : anchor_episodes_index
    • Published: Oct. 22, 2024
    • Modified: Oct. 29, 2024
  • 4.3

    MEDIUM
    CVE-2024-49321

    Missing Authorization vulnerability in Colorlib Simple Custom Post Order allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple Custom Post Order: from n/a through 2.5.7.... Read more

    Affected Products : simple_custom_post_order
    • Published: Oct. 21, 2024
    • Modified: Oct. 29, 2024
  • 5.4

    MEDIUM
    CVE-2024-49293

    Missing Authorization vulnerability in Rextheme WP VR allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP VR: from n/a through 8.5.4.... Read more

    Affected Products : wp_vr
    • Published: Oct. 21, 2024
    • Modified: Oct. 29, 2024
  • 6.1

    MEDIUM
    CVE-2024-10049

    The Edit WooCommerce Templates plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for... Read more

    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 6.1

    MEDIUM
    CVE-2024-8740

    The GetResponse Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.6. This makes it possible for unauthe... Read more

    Affected Products : getresponse_forms
    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 6.1

    MEDIUM
    CVE-2024-8790

    The Social Share With Floating Bar plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.0.3. This makes it possible for unauthe... Read more

    Affected Products : social_share_with_floating_bar
    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 6.4

    MEDIUM
    CVE-2024-8916

    The Suki Sites Import plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated a... Read more

    Affected Products : suki_sites_import
    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 6.5

    MEDIUM
    CVE-2024-50468

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Robinson Raptor Editor allows DOM-Based XSS.This issue affects Raptor Editor: from n/a through 1.0.20.... Read more

    Affected Products :
    • Published: Oct. 28, 2024
    • Modified: Oct. 29, 2024
  • 6.5

    MEDIUM
    CVE-2024-50464

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex Posts likes allows Stored XSS.This issue affects Kodex Posts likes: from n/a through 2.5.0.... Read more

    Affected Products :
    • Published: Oct. 28, 2024
    • Modified: Oct. 29, 2024
Showing 20 of 291712 Results