Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.8

    CRITICAL
    CVE-2024-43488

    Missing authentication for critical function in Visual Studio Code extension for Arduino allows an unauthenticated attacker to perform remote code execution through network attack vector.... Read more

    Affected Products : visual_studio_code
    • Published: Oct. 08, 2024
    • Modified: Oct. 21, 2024
  • 6.1

    MEDIUM
    CVE-2024-10099

    A stored cross-site scripting (XSS) vulnerability exists in comfyanonymous/comfyui version 0.2.2 and possibly earlier. The vulnerability occurs when an attacker uploads an HTML file containing a malicious XSS payload via the `/api/upload/image` endpoint. ... Read more

    Affected Products : comfyui
    • Published: Oct. 17, 2024
    • Modified: Oct. 21, 2024
  • 7.1

    HIGH
    CVE-2024-43615

    Microsoft OpenSSH for Windows Remote Code Execution Vulnerability... Read more

    • Published: Oct. 08, 2024
    • Modified: Oct. 21, 2024
  • 6.4

    MEDIUM
    CVE-2024-10057

    The RSS Feed Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's rfw-youtube-videos shortcode in all versions up to, and including, 2.9.9 due to insufficient input sanitization and output escaping on user supplied att... Read more

    Affected Products : rss_feed_widget
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.9

    MEDIUM
    CVE-2024-43612

    Power BI Report Server Spoofing Vulnerability... Read more

    Affected Products : power_bi_report_server
    • Published: Oct. 08, 2024
    • Modified: Oct. 21, 2024
  • 7.8

    HIGH
    CVE-2024-43616

    Microsoft Office Remote Code Execution Vulnerability... Read more

    • Published: Oct. 08, 2024
    • Modified: Oct. 21, 2024
  • 9.8

    CRITICAL
    CVE-2024-47945

    The devices are vulnerable to session hijacking due to insufficient entropy in its session ID generation algorithm. The session IDs are predictable, with only 32,768 possible values per user, which allows attackers to pre-generate valid session IDs, le... Read more

    • Published: Oct. 15, 2024
    • Modified: Oct. 21, 2024
  • 7.8

    HIGH
    CVE-2024-7994

    A maliciously crafted RFA file, when parsed through Autodesk Revit, can force a Stack-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current p... Read more

    Affected Products : revit
    • Published: Oct. 16, 2024
    • Modified: Oct. 21, 2024
  • 4.9

    MEDIUM
    CVE-2024-21261

    Vulnerability in Oracle Application Express (component: General). Supported versions that are affected are 23.2 and 24.1. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Exp... Read more

    Affected Products : application_express
    • Published: Oct. 15, 2024
    • Modified: Oct. 21, 2024
  • 8.8

    HIGH
    CVE-2024-38814

    An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A malicious authenticated user with non-administrator privileges may be able to enter specially crafted SQL queries and perform unauthorized remote code execut... Read more

    Affected Products : vmware_hcx
    • Published: Oct. 16, 2024
    • Modified: Oct. 21, 2024
  • 7.5

    HIGH
    CVE-2024-43485

    .NET and Visual Studio Denial of Service Vulnerability... Read more

    • Published: Oct. 08, 2024
    • Modified: Oct. 21, 2024
  • 7.5

    HIGH
    CVE-2024-43483

    .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability... Read more

    • Published: Oct. 08, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49233

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MadrasThemes MAS Elementor allows DOM-Based XSS.This issue affects MAS Elementor: from n/a through 1.1.6.... Read more

    Affected Products : mas_elementor
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49234

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in themeworm Plexx Elementor Extension allows Stored XSS.This issue affects Plexx Elementor Extension: from n/a through 1.3.4.... Read more

    Affected Products : plexx_elementor_extension
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49236

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hafiz Uddin Ahmed Crazy Call To Action Box allows Stored XSS.This issue affects Crazy Call To Action Box: from n/a through 1.0.5.... Read more

    Affected Products : crazy_call_to_action_box
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 9.1

    CRITICAL
    CVE-2024-37404

    Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution.... Read more

    Affected Products : connect_secure policy_secure
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 8.1

    HIGH
    CVE-2024-49361

    ACON is a widely-used library of tools for machine learning that focuses on adaptive correlation optimization. A potential vulnerability has been identified in the input validation process, which could lead to arbitrary code execution if exploited. This i... Read more

    Affected Products :
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 8.7

    HIGH
    CVE-2024-48930

    secp256k1-node is a Node.js binding for an Optimized C library for EC operations on curve secp256k1. In `elliptic`-based version, `loadUncompressedPublicKey` has a check that the public key is on the curve. Prior to versions 5.0.1, 4.0.4, and 3.8.1, howev... Read more

    Affected Products :
    • Published: Oct. 21, 2024
    • Modified: Oct. 21, 2024
  • 7.1

    HIGH
    CVE-2024-49238

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in M. Konieczny, DH9SB ADIF Log Search Widget allows Reflected XSS.This issue affects ADIF Log Search Widget: from n/a through 1.0f.... Read more

    Affected Products : adif_log_search_widget
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49231

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Peter CyClop WordPress Video allows Stored XSS.This issue affects WordPress Video: from n/a through 1.0.... Read more

    Affected Products : wordpress_video
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
Showing 20 of 291520 Results