Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.1

    MEDIUM
    CVE-2024-34335

    ORDAT FOSS-Online before version 2.24.01 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the login page.... Read more

    Affected Products : ordat.erp
    • Published: Sep. 12, 2024
    • Modified: Sep. 18, 2024
  • 10.0

    CRITICAL
    CVE-2024-27115

    A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. With this vulnerability, an attacker can upload executable files that are moved to a publicly accessible folder before verifying any requirements... Read more

    Affected Products : soplanning
    • Published: Sep. 11, 2024
    • Modified: Sep. 18, 2024
  • 5.3

    MEDIUM
    CVE-2024-34336

    User enumeration vulnerability in ORDAT FOSS-Online before v2.24.01 allows attackers to determine if an account exists in the application by comparing the server responses of the forgot password functionality.... Read more

    Affected Products : ordat.erp
    • Published: Sep. 12, 2024
    • Modified: Sep. 18, 2024
  • 8.8

    HIGH
    CVE-2024-45181

    An issue was discovered in WibuKey64.sys in WIBU-SYSTEMS WibuKey before v6.70 and fixed in v.6.70. An improper bounds check allows crafted packets to cause an arbitrary address write, resulting in kernel memory corruption.... Read more

    Affected Products : windows wibukey
    • Published: Sep. 12, 2024
    • Modified: Sep. 18, 2024
  • 6.1

    MEDIUM
    CVE-2024-45303

    Discourse Calendar plugin adds the ability to create a dynamic calendar in the first post of a topic to Discourse. Rendering event names can be susceptible to XSS attacks. This vulnerability only affects sites which have modified or disabled Discourse’s d... Read more

    Affected Products : discourse_calendar calendar
    • Published: Sep. 12, 2024
    • Modified: Sep. 18, 2024
  • 6.1

    MEDIUM
    CVE-2024-8646

    In Eclipse Glassfish versions prior to 7.0.10, a URL redirection vulnerability to untrusted sites existed. This vulnerability is caused by the vulnerability (CVE-2023-41080) in the Apache code included in GlassFish. This vulnerability only affects applica... Read more

    Affected Products : glassfish
    • Published: Sep. 11, 2024
    • Modified: Sep. 18, 2024
  • 8.7

    HIGH
    CVE-2024-45786

    This vulnerability exists in Reedos aiM-Star version 2.0.1 due to improper access controls on its certain API endpoints. An authenticated remote attacker could exploit this vulnerability by manipulating a parameter through API request URL which could lead... Read more

    Affected Products : aim-star
    • Published: Sep. 11, 2024
    • Modified: Sep. 18, 2024
  • 8.7

    HIGH
    CVE-2024-45788

    This vulnerability exists in Reedos aiM-Star version 2.0.1 due to missing rate limiting on OTP requests in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endp... Read more

    Affected Products : aim-star
    • Published: Sep. 11, 2024
    • Modified: Sep. 18, 2024
  • 6.9

    MEDIUM
    CVE-2024-45789

    This vulnerability exists in Reedos aiM-Star version 2.0.1 due to improper validation of the ‘mode’ parameter in the API endpoint used during the registration process. An authenticated remote attacker could exploit this vulnerability by manipulating param... Read more

    Affected Products : aim-star
    • Published: Sep. 11, 2024
    • Modified: Sep. 18, 2024
  • 7.8

    HIGH
    CVE-2024-8306

    CWE-269: Improper Privilege Management vulnerability exists that could cause unauthorized access, loss of confidentiality, integrity and availability of the workstation when non-admin authenticated user tries to perform privilege escalation by tampering w... Read more

    • Published: Sep. 11, 2024
    • Modified: Sep. 18, 2024
  • 6.7

    MEDIUM
    CVE-2024-38483

    Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.... Read more

    • Published: Aug. 14, 2024
    • Modified: Sep. 18, 2024
  • 7.8

    HIGH
    CVE-2024-39378

    Audition versions 24.4.1, 23.6.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must ... Read more

    Affected Products : mac_os_x windows audition
    • Published: Sep. 11, 2024
    • Modified: Sep. 18, 2024
  • 5.5

    MEDIUM
    CVE-2024-41868

    Audition versions 24.4.1, 23.6.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issu... Read more

    Affected Products : mac_os_x windows audition
    • Published: Sep. 11, 2024
    • Modified: Sep. 18, 2024
  • 6.1

    MEDIUM
    CVE-2024-8708

    A vulnerability was found in SourceCodester Best House Rental Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file categories.php. The manipulation leads to cross site scripting. The attack may be... Read more

    • Published: Sep. 12, 2024
    • Modified: Sep. 18, 2024
  • 6.5

    MEDIUM
    CVE-2024-38222

    Microsoft Edge (Chromium-based) Information Disclosure Vulnerability... Read more

    Affected Products : edge edge_chromium
    • Published: Sep. 12, 2024
    • Modified: Sep. 18, 2024
  • 7.3

    HIGH
    CVE-2024-20430

    A vulnerability in Cisco Meraki Systems Manager (SM) Agent for Windows could allow an authenticated, local attacker to execute arbitrary code with elevated privileges.  This vulnerability is due to incorrect handling of directory search paths at r... Read more

    Affected Products : meraki_systems_manager
    • Published: Sep. 12, 2024
    • Modified: Sep. 18, 2024
  • 8.8

    HIGH
    CVE-2023-48171

    An issue in OWASP DefectDojo before v.1.5.3.1 allows a remote attacker to escalate privileges via the user permissions component.... Read more

    Affected Products : defectdojo
    • Published: Aug. 12, 2024
    • Modified: Sep. 18, 2024
  • 8.8

    HIGH
    CVE-2024-8749

    SQL injection vulnerability in idoit pro version 28. This vulnerability could allow an attacker to send a specially crafted query to the ID parameter in /var/www/html/src/classes/modules/api/model/cmdb/isys_api_model_cmdb_objects_by_relation.class.php and... Read more

    Affected Products : i-doit
    • Published: Sep. 12, 2024
    • Modified: Sep. 18, 2024
  • 9.8

    CRITICAL
    CVE-2024-41475

    Gnuboard g6 6.0.7 is vulnerable to Session hijacking due to a CORS misconfiguration.... Read more

    Affected Products : gnuboard
    • Published: Aug. 12, 2024
    • Modified: Sep. 18, 2024
  • 9.8

    CRITICAL
    CVE-2024-27113

    An unauthenticated Insecure Direct Object Reference (IDOR) to the database has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database by ex... Read more

    Affected Products : soplanning
    • Published: Sep. 11, 2024
    • Modified: Sep. 18, 2024
Showing 20 of 290986 Results