Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2024-43616

    Microsoft Office Remote Code Execution Vulnerability... Read more

    • Published: Oct. 08, 2024
    • Modified: Oct. 21, 2024
  • 9.8

    CRITICAL
    CVE-2024-47945

    The devices are vulnerable to session hijacking due to insufficient entropy in its session ID generation algorithm. The session IDs are predictable, with only 32,768 possible values per user, which allows attackers to pre-generate valid session IDs, le... Read more

    • Published: Oct. 15, 2024
    • Modified: Oct. 21, 2024
  • 7.8

    HIGH
    CVE-2024-7994

    A maliciously crafted RFA file, when parsed through Autodesk Revit, can force a Stack-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current p... Read more

    Affected Products : revit
    • Published: Oct. 16, 2024
    • Modified: Oct. 21, 2024
  • 4.9

    MEDIUM
    CVE-2024-21261

    Vulnerability in Oracle Application Express (component: General). Supported versions that are affected are 23.2 and 24.1. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Exp... Read more

    Affected Products : application_express
    • Published: Oct. 15, 2024
    • Modified: Oct. 21, 2024
  • 8.8

    HIGH
    CVE-2024-38814

    An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A malicious authenticated user with non-administrator privileges may be able to enter specially crafted SQL queries and perform unauthorized remote code execut... Read more

    Affected Products : vmware_hcx
    • Published: Oct. 16, 2024
    • Modified: Oct. 21, 2024
  • 7.5

    HIGH
    CVE-2024-43485

    .NET and Visual Studio Denial of Service Vulnerability... Read more

    • Published: Oct. 08, 2024
    • Modified: Oct. 21, 2024
  • 7.5

    HIGH
    CVE-2024-43483

    .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability... Read more

    • Published: Oct. 08, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49233

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MadrasThemes MAS Elementor allows DOM-Based XSS.This issue affects MAS Elementor: from n/a through 1.1.6.... Read more

    Affected Products : mas_elementor
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49234

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in themeworm Plexx Elementor Extension allows Stored XSS.This issue affects Plexx Elementor Extension: from n/a through 1.3.4.... Read more

    Affected Products : plexx_elementor_extension
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49236

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hafiz Uddin Ahmed Crazy Call To Action Box allows Stored XSS.This issue affects Crazy Call To Action Box: from n/a through 1.0.5.... Read more

    Affected Products : crazy_call_to_action_box
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 8.1

    HIGH
    CVE-2024-49361

    ACON is a widely-used library of tools for machine learning that focuses on adaptive correlation optimization. A potential vulnerability has been identified in the input validation process, which could lead to arbitrary code execution if exploited. This i... Read more

    Affected Products :
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 9.1

    CRITICAL
    CVE-2024-37404

    Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution.... Read more

    Affected Products : connect_secure policy_secure
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 8.7

    HIGH
    CVE-2024-48930

    secp256k1-node is a Node.js binding for an Optimized C library for EC operations on curve secp256k1. In `elliptic`-based version, `loadUncompressedPublicKey` has a check that the public key is on the curve. Prior to versions 5.0.1, 4.0.4, and 3.8.1, howev... Read more

    Affected Products :
    • Published: Oct. 21, 2024
    • Modified: Oct. 21, 2024
  • 7.1

    HIGH
    CVE-2024-49238

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in M. Konieczny, DH9SB ADIF Log Search Widget allows Reflected XSS.This issue affects ADIF Log Search Widget: from n/a through 1.0f.... Read more

    Affected Products : adif_log_search_widget
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49231

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Peter CyClop WordPress Video allows Stored XSS.This issue affects WordPress Video: from n/a through 1.0.... Read more

    Affected Products : wordpress_video
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49230

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Harpreet Singh Ajax Custom CSS/JS allows Reflected XSS.This issue affects Ajax Custom CSS/JS: from n/a through 2.0.4.... Read more

    Affected Products : ajax_custom_css\/js
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49228

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CrossedCode bVerse Convert allows Stored XSS.This issue affects bVerse Convert: from n/a through 1.3.7.1.... Read more

    Affected Products : bverse_convert
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-49225

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Swebdeveloper wpPricing Builder allows Stored XSS.This issue affects wpPricing Builder: from n/a through 1.5.0.... Read more

    Affected Products : wppricing_builder
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 7.1

    HIGH
    CVE-2024-49224

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mahesh Patel Mitm Bug Tracker allows Reflected XSS.This issue affects Mitm Bug Tracker: from n/a through 1.0.... Read more

    Affected Products : mitm_bug_tracker
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 6.5

    MEDIUM
    CVE-2024-21262

    Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/ODBC). Supported versions that are affected are 9.0.0 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protoco... Read more

    Affected Products : mysql mysql_connector\/odbc
    • Published: Oct. 15, 2024
    • Modified: Oct. 21, 2024
Showing 20 of 291615 Results