Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2024-7906

    A vulnerability classified as critical was found in DedeBIZ 6.3.0. This vulnerability affects the function get_mime_type of the file /admin/dialog/select_images_post.php of the component Attachment Settings. The manipulation of the argument upload leads t... Read more

    Affected Products : dedebiz
    • Published: Aug. 18, 2024
    • Modified: Sep. 27, 2024
  • 6.5

    MEDIUM
    CVE-2024-6337

    An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed a GitHub App with only content: read and pull_request_write: write permissions to read issue content inside a private repository. This was only exploitable vi... Read more

    Affected Products : enterprise_server
    • Published: Aug. 20, 2024
    • Modified: Sep. 27, 2024
  • 5.3

    MEDIUM
    CVE-2024-7390

    The WP Testimonial Widget plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnSaveTestimonailOrder function in all versions up to, and including, 3.0. This makes it possible for unauthenticate... Read more

    Affected Products : wp_testimonial_widget
    • Published: Aug. 21, 2024
    • Modified: Sep. 27, 2024
  • 6.4

    MEDIUM
    CVE-2024-7629

    The Responsive video plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's video settings function in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attribute... Read more

    Affected Products : responsive_video
    • Published: Aug. 21, 2024
    • Modified: Sep. 27, 2024
  • 6.1

    MEDIUM
    CVE-2024-7647

    The OTA Sync Booking Engine Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.7. This is due to missing or incorrect nonce validation on the otasync_widget_settings_fnc() function. This makes... Read more

    Affected Products : ota_sync_booking_engine_widget
    • Published: Aug. 21, 2024
    • Modified: Sep. 27, 2024
  • 10.0

    CRITICAL
    CVE-2024-7854

    The Woo Inquiry plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 0.1 due to insufficient escaping on the user supplied parameter 'dbid' and lack of sufficient preparation on the existing SQL query. This makes it po... Read more

    Affected Products : woo_inquiry
    • Published: Aug. 21, 2024
    • Modified: Sep. 27, 2024
  • 6.1

    MEDIUM
    CVE-2024-8665

    The YITH Custom Login plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.7.3. This makes it possible for unauthenticated atta... Read more

    Affected Products : yith_custom_login
    • Published: Sep. 13, 2024
    • Modified: Sep. 27, 2024
  • 6.1

    MEDIUM
    CVE-2024-8052

    The Review Ratings WordPress plugin through 1.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.... Read more

    Affected Products : review_ratings
    • Published: Sep. 17, 2024
    • Modified: Sep. 27, 2024
  • 5.5

    MEDIUM
    CVE-2024-40703

    IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and IBM Cognos Analytics Reports for iOS 11.0.0.7 could allow a local attacker to obtain sensitive information in the form of an API key. An attacker could use t... Read more

    • Published: Sep. 22, 2024
    • Modified: Sep. 27, 2024
  • 6.4

    MEDIUM
    CVE-2024-8543

    The Slider comparison image before and after plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [sciba] shortcode in all versions up to, and including, 0.8.3 due to insufficient input sanitization and output escaping on use... Read more

    • Published: Sep. 10, 2024
    • Modified: Sep. 27, 2024
  • 5.3

    MEDIUM
    CVE-2022-3459

    The WooCommerce Multiple Free Gift plugin for WordPress is vulnerable to gift manipulation in all versions up to, and including, 1.2.3. This is due to plugin not enforcing server-side checks on the products that can be added as a gift. This makes it possi... Read more

    Affected Products : woocommerce_multiple_free_gift
    • Published: Sep. 14, 2024
    • Modified: Sep. 27, 2024
  • 6.1

    MEDIUM
    CVE-2024-8663

    The WP Simple Booking Calendar plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0.10. This makes it poss... Read more

    Affected Products : wp_simple_booking_calendar
    • Published: Sep. 13, 2024
    • Modified: Sep. 27, 2024
  • 7.5

    HIGH
    CVE-2024-46985

    DataEase is an open source data visualization analysis tool. Prior to version 2.10.1, there is an XML external entity injection vulnerability in the static resource upload interface of DataEase. An attacker can construct a payload to implement intranet de... Read more

    Affected Products : dataease
    • Published: Sep. 23, 2024
    • Modified: Sep. 27, 2024
  • 5.4

    MEDIUM
    CVE-2024-9077

    A vulnerability classified as problematic has been found in dingfangzu up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. Affected is an unknown function of the file scripts/order.js of the component Order Checkout. The manipulation of the argument address-n... Read more

    Affected Products : dingfanzu
    • Published: Sep. 22, 2024
    • Modified: Sep. 27, 2024
  • 6.4

    MEDIUM
    CVE-2024-8742

    The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Filterable Gallery widget in all versions up to, and including, 6... Read more

    Affected Products : essential_addons_for_elementor
    • Published: Sep. 13, 2024
    • Modified: Sep. 27, 2024
  • 7.2

    HIGH
    CVE-2024-9093

    A vulnerability classified as critical has been found in SourceCodester Profile Registration without Reload Refresh 1.0. This affects an unknown part of the file del.php of the component GET Parameter Handler. The manipulation of the argument list leads t... Read more

    • Published: Sep. 23, 2024
    • Modified: Sep. 27, 2024
  • 6.1

    MEDIUM
    CVE-2024-9092

    A vulnerability was found in SourceCodester Profile Registration without Reload Refresh 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file add.php of the component Registration Form. The manipulation of... Read more

    • Published: Sep. 23, 2024
    • Modified: Sep. 27, 2024
  • 9.8

    CRITICAL
    CVE-2024-9091

    A vulnerability was found in code-projects Student Record System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument regno leads to sql injection. The a... Read more

    Affected Products : student_record_system
    • Published: Sep. 23, 2024
    • Modified: Sep. 27, 2024
  • 9.8

    CRITICAL
    CVE-2024-9090

    A vulnerability was found in SourceCodester Modern Loan Management System 1.0. It has been classified as critical. Affected is an unknown function of the file search_member.php. The manipulation of the argument searchMember leads to sql injection. It is p... Read more

    Affected Products : modern_loan_management_system
    • Published: Sep. 23, 2024
    • Modified: Sep. 27, 2024
  • 7.3

    HIGH
    CVE-2024-8271

    The The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.4.2.1. This is due to the software allowing users to execute an action that does not p... Read more

    • Published: Sep. 14, 2024
    • Modified: Sep. 27, 2024
Showing 20 of 291117 Results