Latest CVE Feed
-
5.3
MEDIUMCVE-2024-50422
Missing Authorization vulnerability in Cloudways Breeze allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Breeze: from n/a through 2.1.14.... Read more
Affected Products :- Published: Oct. 29, 2024
- Modified: Nov. 01, 2024
-
5.3
MEDIUMCVE-2024-50454
Missing Authorization vulnerability in The SEO Guys at SEOPress SEOPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SEOPress: from n/a through 8.1.1.... Read more
Affected Products :- Published: Oct. 29, 2024
- Modified: Nov. 01, 2024
-
9.8
CRITICALCVE-2024-48206
A Deserialization of Untrusted Data vulnerability in chainer v7.8.1.post1 leads to execution of arbitrary code.... Read more
Affected Products :- Published: Oct. 29, 2024
- Modified: Nov. 01, 2024
-
5.4
MEDIUMCVE-2024-50423
Missing Authorization vulnerability in Templately allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Templately: from n/a through 3.1.5.... Read more
Affected Products :- Published: Oct. 29, 2024
- Modified: Nov. 01, 2024
-
4.8
MEDIUMCVE-2024-48461
Cross Site Scripting vulnerability in TeslaLogger Admin Panel before v.1.59.6 allows a remote attacker to execute arbitrary code via the New Journey field.... Read more
Affected Products :- Published: Oct. 29, 2024
- Modified: Nov. 01, 2024
-
7.5
HIGHCVE-2019-25219
Asio C++ Library before 1.13.0 lacks a fallback error code in the case of SSL_ERROR_SYSCALL with no associated error information from the SSL library being used.... Read more
Affected Products :- Published: Oct. 29, 2024
- Modified: Nov. 01, 2024
-
6.5
MEDIUMCVE-2024-50425
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Veribo, Roland Murg WP Booking System.This issue affects WP Booking System: from n/a through 2.0.19.10.... Read more
Affected Products :- Published: Oct. 29, 2024
- Modified: Nov. 01, 2024
-
6.5
MEDIUMCVE-2024-50424
Missing Authorization vulnerability in Templately allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Templately: from n/a through 3.1.5.... Read more
Affected Products :- Published: Oct. 29, 2024
- Modified: Nov. 01, 2024
-
5.3
MEDIUMCVE-2024-50421
Missing Authorization vulnerability in WP Overnight WooCommerce PDF Invoices & Packing Slips allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce PDF Invoices & Packing Slips: from n/a through 3.8.6.... Read more
Affected Products : woocommerce_pdf_invoices\&_packing_slips- Published: Oct. 29, 2024
- Modified: Nov. 01, 2024
-
4.6
MEDIUMCVE-2024-50344
I, Librarian is an open-source version of a PDF managing SaaS. Supplemental Files are allowed to be viewed in the browser, only if they have a white-listed MIME type. Unfortunately, this logic is broken, thus allowing unsafe files containing Javascript to... Read more
Affected Products :- Published: Oct. 30, 2024
- Modified: Nov. 01, 2024
-
5.5
MEDIUMCVE-2024-50354
gnark is a fast zk-SNARK library that offers a high-level API to design circuits. In gnark 0.11.0 and earlier, deserialization of Groth16 verification keys allocate excessive memory, consuming a lot of resources and triggering a crash with the error fatal... Read more
Affected Products : gnark-crypto- Published: Oct. 31, 2024
- Modified: Nov. 01, 2024
-
6.3
MEDIUMCVE-2024-50347
Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. Prior to 1.4.0, there is an issue where verification signatures for requests sent to Reverb's Pusher-compatible API were not being verified. This API is used in ... Read more
Affected Products : laravel- Published: Oct. 31, 2024
- Modified: Nov. 01, 2024
-
5.4
MEDIUMCVE-2024-7424
The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to unauthorized modification of and access to data due to a missing capability check on several functions in all versions up to, and including, 4.0.1. This makes it possible for a... Read more
Affected Products :- Published: Nov. 01, 2024
- Modified: Nov. 01, 2024
-
3.7
LOWCVE-2024-7883
When using Arm Cortex-M Security Extensions (CMSE), Secure stack contents can be leaked to Non-secure state via floating-point registers when a Secure to Non-secure function call is made that returns a floating-point value and when this is the first us... Read more
Affected Products :- Published: Oct. 31, 2024
- Modified: Nov. 01, 2024
-
8.0
HIGHCVE-2024-48093
Unrestricted File Upload in the Discussions tab in Operately v.0.1.0 allows a privileged user to achieve Remote Code Execution via uploading and executing malicious files without validating file extensions or content types.... Read more
Affected Products :- Published: Oct. 30, 2024
- Modified: Nov. 01, 2024
-
8.8
HIGHCVE-2024-36060
EnGenius EnStation5-AC A8J-ENS500AC 1.0.0 devices allow blind OS command injection via shell metacharacters in the Ping and Speed Test parameters.... Read more
Affected Products :- Published: Oct. 30, 2024
- Modified: Nov. 01, 2024
-
6.4
MEDIUMCVE-2024-9885
The Widget or Sidebar Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sidebar' shortcode in all versions up to, and including, 0.6.1 due to insufficient input sanitization and output escaping on user supplied ... Read more
Affected Products :- Published: Oct. 30, 2024
- Modified: Nov. 01, 2024
-
1.0
LOWCVE-2024-51481
Nix is a package manager for Linux and other Unix systems. On macOS, built-in builders (such as `builtin:fetchurl`, exposed to users with `import <nix/fetchurl.nix>`) were not executed in the macOS sandbox. Thus, these builders (which are running under th... Read more
- Published: Oct. 31, 2024
- Modified: Nov. 01, 2024
-
4.3
MEDIUMCVE-2024-43930
Cross-Site Request Forgery (CSRF) vulnerability in eyecix JobSearch allows Cross Site Request Forgery.This issue affects JobSearch: from n/a through 2.5.3.... Read more
Affected Products :- Published: Oct. 31, 2024
- Modified: Nov. 01, 2024
-
4.9
MEDIUMCVE-2024-10651
IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrator privileges to exploit this vulnerability to read arbitrary system files.... Read more
Affected Products :- Published: Nov. 01, 2024
- Modified: Nov. 01, 2024