Latest CVE Feed
-
5.5
MEDIUMCVE-2024-46856
In the Linux kernel, the following vulnerability has been resolved: net: phy: dp83822: Fix NULL pointer dereference on DP83825 devices The probe() function is only used for DP83822 and DP83826 PHY, leaving the private data pointer uninitialized for the ... Read more
Affected Products : linux_kernel- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
8.8
HIGHCVE-2024-8890
An attacker with access to the network where the CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could obtain legitimate credentials or steal sessions due to the fact that the device only implements the HTTP protocol. This fact prevents a secure ... Read more
- Published: Sep. 18, 2024
- Modified: Oct. 01, 2024
-
9.8
CRITICALCVE-2024-43423
The web application for ProGauge MAGLINK LX4 CONSOLE contains an administrative-level user account with a password that cannot be changed.... Read more
- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
7.8
HIGHCVE-2024-43405
Nuclei is a vulnerability scanner powered by YAML based templates. Starting in version 3.0.0 and prior to version 3.3.2, a vulnerability in Nuclei's template signature verification system could allow an attacker to bypass the signature check and possibly ... Read more
Affected Products : nuclei- Published: Sep. 04, 2024
- Modified: Oct. 01, 2024
-
8.8
HIGHCVE-2024-43402
Rust is a programming language. The fix for CVE-2024-24576, where `std::process::Command` incorrectly escaped arguments when invoking batch files on Windows, was incomplete. Prior to Rust version 1.81.0, it was possible to bypass the fix when the batch fi... Read more
Affected Products : rust- Published: Sep. 04, 2024
- Modified: Oct. 01, 2024
-
6.4
MEDIUMCVE-2024-9023
The WP-WebAuthn plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wwa_login_form shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes.... Read more
Affected Products : wp-webauthn- Published: Sep. 28, 2024
- Modified: Oct. 01, 2024
-
6.1
MEDIUMCVE-2024-8715
The Simple LDAP Login plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.6.0. This makes it possible for unauthenticated atta... Read more
Affected Products : simple_ldap_login- Published: Sep. 28, 2024
- Modified: Oct. 01, 2024
-
6.4
MEDIUMCVE-2024-8547
The Simple Popup Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [popup] shortcode in all versions up to, and including, 4.5 due to insufficient input sanitization and output escaping on user supplied attributes. ... Read more
Affected Products : simple_popup_plugin- Published: Sep. 28, 2024
- Modified: Oct. 01, 2024
-
10.0
CRITICALCVE-2024-8353
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1 via deserialization of untrusted input via several parameters like 'give_title' and 'card_address... Read more
Affected Products : givewp- Published: Sep. 28, 2024
- Modified: Oct. 01, 2024
-
7.5
HIGHCVE-2024-9136
Access permission verification vulnerability in the App Multiplier module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
7.5
HIGHCVE-2024-47294
Access permission verification vulnerability in the input method framework module Impact: Successful exploitation of this vulnerability may affect availability.... Read more
- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
7.5
HIGHCVE-2024-47293
Out-of-bounds write vulnerability in the HAL-WIFI module Impact: Successful exploitation of this vulnerability may affect availability.... Read more
- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
6.2
MEDIUMCVE-2024-47292
Path traversal vulnerability in the Bluetooth module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
5.6
MEDIUMCVE-2024-47291
Permission vulnerability in the ActivityManagerService (AMS) module Impact: Successful exploitation of this vulnerability may affect availability.... Read more
- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
5.5
MEDIUMCVE-2024-47290
Input validation vulnerability in the USB service module Impact: Successful exploitation of this vulnerability may affect availability.... Read more
- Published: Sep. 27, 2024
- Modified: Oct. 01, 2024
-
5.5
MEDIUMCVE-2024-8633
The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.15.27 due to insufficient input sanitization and output escaping. This mak... Read more
Affected Products : form_maker- Published: Sep. 26, 2024
- Modified: Oct. 01, 2024
-
6.8
MEDIUMCVE-2024-8725
Multiple plugins and/or themes for WordPress are vulnerable to Limited File Upload in various versions. This is due to a lack of proper checks to ensure lower-privileged roles cannot upload .css and .js files to arbitrary directories. This makes it possib... Read more
Affected Products : advanced_file_manager- Published: Sep. 26, 2024
- Modified: Oct. 01, 2024
-
7.2
HIGHCVE-2024-8704
The Advanced File Manager plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 5.2.8 via the 'fma_locale' parameter. This makes it possible for authenticated attackers, with Administrator-level access... Read more
Affected Products : advanced_file_manager- Published: Sep. 26, 2024
- Modified: Oct. 01, 2024
-
6.1
MEDIUMCVE-2024-7260
An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the referrer and referrer_uri parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into believ... Read more
- Published: Sep. 09, 2024
- Modified: Oct. 01, 2024
-
7.5
HIGHCVE-2023-6841
A denial of service vulnerability was found in keycloak where the amount of attributes per object is not limited,an attacker by sending repeated HTTP requests could cause a resource exhaustion when the application send back rows with long attribute values... Read more
- Published: Sep. 10, 2024
- Modified: Oct. 01, 2024