Latest CVE Feed
-
8.8
HIGHCVE-2024-9890
The User Toolkit plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2.3. This is due to an improper capability check in the 'switchUser' function. This makes it possible for authenticated attackers, with subscr... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
6.5
MEDIUMCVE-2024-10435
A vulnerability was found in didi Super-Jacoco 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /cov/triggerEnvCov. The manipulation of the argument uuid leads to command injection. The attack can be initiated rem... Read more
Affected Products : super-jacoco- Published: Oct. 28, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9116
The Monkee-Boy Essentials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
4.3
MEDIUMCVE-2024-10357
The Clever Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.1 via the getTemplateContent function in src/widgets/class-clever-widget-base.php. This makes it possible for au... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
5.3
MEDIUMCVE-2023-26248
The Kademlia DHT (go-libp2p-kad-dht 0.20.0 and earlier) used in IPFS (0.18.1 and earlier) assigns routing information for content (i.e., information about who holds the content) to be stored by peers whose peer IDs have a small DHT distance from the conte... Read more
Affected Products :- Published: Oct. 25, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9454
The PriPre plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 0.4.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, ... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
4.3
MEDIUMCVE-2024-10092
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_handle_api_key_actions function in all versions up to, and including, 5.0.12. This makes it possible for authenticat... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
5.5
MEDIUMCVE-2024-44099
There is a possible Local bypass of user interaction due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more
Affected Products : android- Published: Oct. 25, 2024
- Modified: Oct. 28, 2024
-
7.5
HIGHCVE-2024-44100
Android before 2024-10-05 on Google Pixel devices allows information disclosure in the modem component, A-299774545.... Read more
Affected Products : android pixel_6 pixel pixel_2 pixel_2_xl pixel_3 pixel_3_xl pixel_3a pixel_3a_xl pixel_4 +22 more products- Published: Oct. 25, 2024
- Modified: Oct. 28, 2024
-
7.3
HIGHCVE-2024-42020
A Cross-site-scripting (XSS) vulnerability exists in the Reporter Widgets that allows HTML injection.... Read more
Affected Products : one- Published: Sep. 07, 2024
- Modified: Oct. 27, 2024
-
4.4
MEDIUMCVE-2024-20097
In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-... Read more
- Published: Oct. 07, 2024
- Modified: Oct. 27, 2024
-
4.4
MEDIUMCVE-2024-20096
In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996900; Issue ID: MSV-1... Read more
- Published: Oct. 07, 2024
- Modified: Oct. 27, 2024
-
4.4
MEDIUMCVE-2024-20095
In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996894; Issue ID: MSV-1... Read more
- Published: Oct. 07, 2024
- Modified: Oct. 27, 2024
-
4.4
MEDIUMCVE-2024-20093
In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-... Read more
- Published: Oct. 07, 2024
- Modified: Oct. 27, 2024
-
4.4
MEDIUMCVE-2024-20091
In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-... Read more
- Published: Oct. 07, 2024
- Modified: Oct. 27, 2024
-
4.4
MEDIUMCVE-2024-20085
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944204; Issue ID: MSV... Read more
- Published: Sep. 02, 2024
- Modified: Oct. 27, 2024
-
4.4
MEDIUMCVE-2024-20084
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV... Read more
- Published: Sep. 02, 2024
- Modified: Oct. 27, 2024
-
6.3
MEDIUMCVE-2024-50583
Whale browser Installer before 3.1.0.0 allows an attacker to execute a malicious DLL in the user environment due to improper permission settings.... Read more
Affected Products :- Published: Oct. 25, 2024
- Modified: Oct. 25, 2024
-
7.1
HIGHCVE-2022-48967
In the Linux kernel, the following vulnerability has been resolved: NFC: nci: Bounds check struct nfc_target arrays While running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported: memcpy: detected field-spanning write (size 129) of single field "tar... Read more
Affected Products : linux_kernel- Published: Oct. 21, 2024
- Modified: Oct. 25, 2024
-
5.5
MEDIUMCVE-2022-48968
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential memory leak in otx2_init_tc() In otx2_init_tc(), if rhashtable_init() failed, it does not free tc->tc_entries_bitmap which is allocated in otx2_tc_alloc_ent_... Read more
Affected Products : linux_kernel- Published: Oct. 21, 2024
- Modified: Oct. 25, 2024