Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2023-26315

    The Xiaomi router AX9000 has a post-authentication command injection vulnerability. This vulnerability is caused by the lack of input filtering, allowing an attacker to exploit it to obtain root access to the device.... Read more

    Affected Products : ax9000_firmware ax9000
    • Published: Aug. 26, 2024
    • Modified: Oct. 08, 2024
  • 4.8

    MEDIUM
    CVE-2024-8758

    The Quiz and Survey Master (QSM) WordPress plugin before 9.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability... Read more

    Affected Products : quiz_and_survey_master
    • Published: Sep. 23, 2024
    • Modified: Oct. 07, 2024
  • 8.8

    HIGH
    CVE-2024-46041

    IoT Haat Smart Plug IH-IN-16A-S v5.16.1 is vulnerable to Authentication Bypass by Capture-replay.... Read more

    Affected Products :
    • Published: Oct. 07, 2024
    • Modified: Oct. 07, 2024
  • 6.1

    MEDIUM
    CVE-2024-9225

    The SEOPress – On-site SEO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 8.1.1. This makes it possible ... Read more

    Affected Products : seopress
    • Published: Oct. 02, 2024
    • Modified: Oct. 07, 2024
  • 4.8

    MEDIUM
    CVE-2024-7318

    A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 ... Read more

    Affected Products : keycloak build_of_keycloak
    • Published: Sep. 09, 2024
    • Modified: Oct. 07, 2024
  • 9.8

    CRITICAL
    CVE-2024-9429

    A vulnerability has been found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter2.php. The manipulation of the argument from/to leads to sql inject... Read more

    Affected Products : restaurant_reservation_system
    • Published: Oct. 02, 2024
    • Modified: Oct. 07, 2024
  • 6.1

    MEDIUM
    CVE-2024-9378

    The YML for Yandex Market plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 4.7.2 due to insufficient input sanitization and output escaping. This makes it possible for unau... Read more

    Affected Products : yml_for_yandex_market
    • Published: Oct. 02, 2024
    • Modified: Oct. 07, 2024
  • 5.4

    MEDIUM
    CVE-2024-20442

    A vulnerability in the REST API endpoints of Cisco Nexus Dashboard could allow an authenticated, low-privileged, remote attacker to perform limited Administrator actions on an affected device. This vulnerability is due to insufficient authorization con... Read more

    • Published: Oct. 02, 2024
    • Modified: Oct. 07, 2024
  • 6.4

    MEDIUM
    CVE-2024-8282

    The Ibtana – WordPress Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ attribute within the 'wp:ive/ive-productscarousel' Gutenberg block in all versions up to, and including, 1.2.4.4 due to insufficient i... Read more

    Affected Products : ibtana
    • Published: Oct. 02, 2024
    • Modified: Oct. 07, 2024
  • 6.5

    MEDIUM
    CVE-2024-43694

    In the goTenna Pro ATAK Plugin application, the encryption keys are stored along with a static IV on the device. This allows for complete decryption of keys stored on the device. This allows an attacker to decrypt all encrypted broadcast communications... Read more

    Affected Products : atak_plugin gotenna
    • Published: Sep. 26, 2024
    • Modified: Oct. 07, 2024
  • 6.7

    MEDIUM
    CVE-2024-47911

    In SonarSource SonarQube 10.4 through 10.5 before 10.6, a vulnerability was discovered in the authorizations/group-memberships API endpoint that allows SonarQube users with the administrator role to inject blind SQL commands.... Read more

    Affected Products :
    • Published: Oct. 04, 2024
    • Modified: Oct. 07, 2024
  • 7.2

    HIGH
    CVE-2024-47910

    An issue was discovered in SonarSource SonarQube before 9.9.5 LTA and 10.x before 10.5. A SonarQube user with the Administrator role can modify an existing configuration of a GitHub integration to exfiltrate a pre-signed JWT.... Read more

    Affected Products :
    • Published: Oct. 04, 2024
    • Modified: Oct. 07, 2024
  • 8.0

    HIGH
    CVE-2024-46658

    Syrotech SY-GOPON-8OLT-L3 v1.6.0_240629 was discovered to contain an authenticated command injection vulnerability.... Read more

    Affected Products :
    • Published: Oct. 03, 2024
    • Modified: Oct. 07, 2024
  • 6.7

    MEDIUM
    CVE-2024-42027

    The E2EE password entropy generated by Rocket.Chat Mobile prior to version 4.5.1 is insufficient, allowing attackers to crack it if they have the appropriate time and resources.... Read more

    Affected Products :
    • Published: Oct. 07, 2024
    • Modified: Oct. 07, 2024
  • 6.4

    MEDIUM
    CVE-2024-8505

    The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘button_label’ parameter in all versions up to, and including, 7.1.2 due to insufficient input sanitization and output escaping. This ... Read more

    Affected Products : ajax_load_more
    • Published: Oct. 02, 2024
    • Modified: Oct. 07, 2024
  • 6.1

    MEDIUM
    CVE-2024-8799

    The Custom Banners plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.3. This makes it possible for unauthenticated attackers... Read more

    Affected Products : custom_banners
    • Published: Oct. 01, 2024
    • Modified: Oct. 07, 2024
  • 8.8

    HIGH
    CVE-2024-9018

    The WP Easy Gallery – WordPress Gallery Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the ‘key’ parameter in all versions up to, and including, 4.8.5 due to insufficient escaping on the user supplied parameter and lack of suffi... Read more

    Affected Products : wp_easy_gallery
    • Published: Oct. 01, 2024
    • Modified: Oct. 07, 2024
  • 6.1

    MEDIUM
    CVE-2024-9209

    The WP Search Analytics plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.4.10. This makes it possible for unauthenticated a... Read more

    Affected Products : wp_search_analytics
    • Published: Oct. 01, 2024
    • Modified: Oct. 07, 2024
  • 6.1

    MEDIUM
    CVE-2024-9220

    The LH Copy Media File plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.08. This makes it possible for unauthenticated atta... Read more

    Affected Products : lh_copy_media_file
    • Published: Oct. 01, 2024
    • Modified: Oct. 07, 2024
  • 6.5

    MEDIUM
    CVE-2024-9224

    The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to r... Read more

    Affected Products : hello_world
    • Published: Oct. 01, 2024
    • Modified: Oct. 07, 2024
Showing 20 of 291196 Results