Latest CVE Feed
-
5.1
MEDIUMCVE-2024-9952
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/?page=system_info/contact_info of the component Contact Information Page. The manipulation of ... Read more
Affected Products : online_eyewear_shop- Published: Oct. 15, 2024
- Modified: Oct. 16, 2024
-
9.8
CRITICALCVE-2024-48253
Cloudlog 2.6.15 allows Oqrs.php delete_oqrs_line id SQL injection.... Read more
Affected Products : cloudlog- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
6.1
MEDIUMCVE-2024-9204
The Smart Custom 404 Error Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via $_SERVER['REQUEST_URI'] in all versions up to, and including, 11.4.7 due to insufficient input sanitization and output escaping. This makes it possibl... Read more
Affected Products : smart_custom_404_error_page- Published: Oct. 04, 2024
- Modified: Oct. 16, 2024
-
9.8
CRITICALCVE-2024-48255
Cloudlog 2.6.15 allows Oqrs.php get_station_info station_id SQL injection.... Read more
Affected Products : cloudlog- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
9.8
CRITICALCVE-2024-48257
Wavelog 1.8.5 allows Oqrs_model.php get_worked_modes station_id SQL injectioin.... Read more
Affected Products : wavelog- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
9.0
HIGHCVE-2024-9784
A vulnerability classified as critical has been found in D-Link DIR-619L B1 2.06. Affected is the function formResetStatistic of the file /goform/formResetStatistic. The manipulation of the argument curTime leads to buffer overflow. It is possible to laun... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 16, 2024
-
8.1
HIGHCVE-2024-47652
This vulnerability exists in Shilpi Client Dashboard due to implementation of inadequate authentication mechanism in the login module wherein access to any users account is granted with just their corresponding mobile number. A remote attacker could explo... Read more
- Published: Oct. 04, 2024
- Modified: Oct. 16, 2024
-
5.7
MEDIUMCVE-2024-46988
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with infor... Read more
Affected Products : tuleap- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
6.4
MEDIUMCVE-2024-8519
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'um_loggedin' shortcode in all versions up to, and includ... Read more
Affected Products : ultimate_member- Published: Oct. 04, 2024
- Modified: Oct. 16, 2024
-
4.8
MEDIUMCVE-2024-46980
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact lin... Read more
Affected Products : tuleap- Published: Oct. 14, 2024
- Modified: Oct. 16, 2024
-
7.8
HIGHCVE-2024-47134
Out-of-bounds write vulnerability exists in Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) Version 1.6.14.0 and earlier. Having a user open a specially crafted project file which was saved using Kostac PLC Programming Softwar... Read more
- Published: Oct. 03, 2024
- Modified: Oct. 16, 2024
-
8.8
HIGHCVE-2024-9975
A vulnerability was found in SourceCodester Drag and Drop Image Upload 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /upload.php. The manipulation leads to unrestricted upload. The attack may be launc... Read more
Affected Products : drag_and_drop_image_upload- Published: Oct. 15, 2024
- Modified: Oct. 16, 2024
-
9.8
CRITICALCVE-2024-9976
A vulnerability classified as critical has been found in code-projects Pharmacy Management System 1.0. This affects an unknown part of the file /php/manage_customer.php?action=search. The manipulation of the argument text leads to sql injection. It is pos... Read more
Affected Products : pharmacy_management_system- Published: Oct. 15, 2024
- Modified: Oct. 16, 2024
-
5.5
MEDIUMCVE-2024-39379
Acrobat for Edge versions 126.0.2592.81 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of th... Read more
- Published: Jul. 31, 2024
- Modified: Oct. 16, 2024
-
6.8
MEDIUMCVE-2024-39406
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An admin attacker cou... Read more
- Published: Aug. 14, 2024
- Modified: Oct. 16, 2024
-
4.3
MEDIUMCVE-2024-39408
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changeson behalf of a user. T... Read more
- Published: Aug. 14, 2024
- Modified: Oct. 16, 2024
-
4.3
MEDIUMCVE-2024-39409
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changes on behalf of a user. ... Read more
- Published: Aug. 14, 2024
- Modified: Oct. 16, 2024
-
4.3
MEDIUMCVE-2024-39410
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changes on behalf of a user. ... Read more
- Published: Aug. 14, 2024
- Modified: Oct. 16, 2024
-
4.3
MEDIUMCVE-2024-39412
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass securi... Read more
- Published: Aug. 14, 2024
- Modified: Oct. 16, 2024
-
5.5
MEDIUMCVE-2024-41867
After Effects versions 23.6.6, 24.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this i... Read more
- Published: Sep. 13, 2024
- Modified: Oct. 16, 2024