Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.1

    HIGH
    CVE-2024-7396

    Missing encryption of sensitive data in Korenix JetPort 5601v3 allows Eavesdropping.This issue affects JetPort 5601v3: through 1.2.... Read more

    Affected Products :
    • Published: Aug. 05, 2024
    • Modified: Aug. 06, 2024
  • 7.8

    HIGH
    CVE-2024-6472

    Certificate Validation user interface in LibreOffice allows potential vulnerability. Signed macros are scripts that have been digitally signed by the developer using a cryptographic signature. When a document with a signed macro is opened a warning ... Read more

    Affected Products : libreoffice
    • Published: Aug. 05, 2024
    • Modified: Aug. 06, 2024
  • 7.2

    HIGH
    CVE-2024-7485

    The Traffic Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page' parameter in the 'UserWebStat' AJAX function in all versions up to, and including, 1.4.5 due to insufficient input sanitization and output escaping. This ... Read more

    Affected Products :
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 9.3

    CRITICAL
    CVE-2024-6915

    JFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning.... Read more

    Affected Products : artifactory
    • Published: Aug. 05, 2024
    • Modified: Aug. 06, 2024
  • 3.0

    LOW
    CVE-2024-42350

    Biscuit is an authorization token with decentralized verification, offline attenuation and strong security policy enforcement based on a logic language. Third-party blocks can be generated without transferring the whole token to the third-party authority.... Read more

    Affected Products :
    • Published: Aug. 05, 2024
    • Modified: Aug. 06, 2024
  • 3.9

    LOW
    CVE-2024-41811

    ipl/web is a set of common web components for php projects. Some of the recent development by Icinga is, under certain circumstances, susceptible to cross site request forgery. (CSRF). All affected products, in any version, will be unaffected by this once... Read more

    Affected Products :
    • Published: Aug. 05, 2024
    • Modified: Aug. 06, 2024
  • 9.8

    CRITICAL
    CVE-2024-6782

    Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.... Read more

    Affected Products : calibre
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 10.0

    CRITICAL
    CVE-2024-6886

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gitea Gitea Open Source Git Server allows Stored XSS.This issue affects Gitea Open Source Git Server: 1.22.0.... Read more

    Affected Products : gitea
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 6.7

    MEDIUM
    CVE-2024-5963

    Unquoted Executable Path vulnerability in Hitachi Device Manager on Windows (Device Manager Server component).This issue affects Hitachi Device Manager: before 8.8.7-00.... Read more

    Affected Products : device_manager
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 8.8

    HIGH
    CVE-2024-6315

    The Blox Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'handleUploadFile' function in all versions up to, and including, 1.0.65. This makes it possible for authenticated attackers, wit... Read more

    Affected Products :
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 8.8

    HIGH
    CVE-2023-5000

    The Horizontal scrolling announcements plugin for WordPress is vulnerable to SQL Injection via the plugin's 'hsas-shortcode' shortcode in versions up to, and including, 2.4 due to insufficient escaping on the user supplied parameter and lack of sufficient... Read more

    Affected Products :
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 8.8

    HIGH
    CVE-2024-41376

    dzzoffice 2.02.1 is vulnerable to Directory Traversal via user/space/about.php.... Read more

    Affected Products :
    • Published: Aug. 05, 2024
    • Modified: Aug. 06, 2024
  • 9.8

    CRITICAL
    CVE-2024-40498

    SQL Injection vulnerability in PuneethReddyHC Online Shopping sysstem advanced v.1.0 allows an attacker to execute arbitrary code via the register.php... Read more

    Affected Products : online_shopping_system_advanced
    • Published: Aug. 05, 2024
    • Modified: Aug. 06, 2024
  • 6.0

    MEDIUM
    CVE-2024-41820

    Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excess... Read more

    Affected Products :
    • Published: Aug. 05, 2024
    • Modified: Aug. 06, 2024
  • 9.8

    CRITICAL
    CVE-2024-7257

    The YayExtra – WooCommerce Extra Product Options plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_upload_file function in all versions up to, and including, 1.3.7. This makes it possible for un... Read more

    Affected Products :
    • Published: Aug. 03, 2024
    • Modified: Aug. 05, 2024
  • 7.2

    HIGH
    CVE-2024-7291

    The JetFormBuilder plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3.4.1. This is due to improper restriction on user meta fields. This makes it possible for authenticated attackers, with administrator-le... Read more

    Affected Products :
    • Published: Aug. 03, 2024
    • Modified: Aug. 05, 2024
  • 7.5

    HIGH
    CVE-2024-28297

    SQL injection vulnerability in AzureSoft MyHorus 4.3.5 allows authenticated users to execute arbitrary SQL commands via unspecified vectors.... Read more

    Affected Products :
    • Published: Aug. 02, 2024
    • Modified: Aug. 05, 2024
  • 7.1

    HIGH
    CVE-2024-22169

    WD Discovery versions prior to 5.0.589 contain a misconfiguration in the Node.js environment settings that could allow code execution by utilizing the 'ELECTRON_RUN_AS_NODE' environment variable. Any malicious application operating with standard user perm... Read more

    Affected Products : wd_discovery
    • Published: Aug. 02, 2024
    • Modified: Aug. 05, 2024
  • 7.5

    HIGH
    CVE-2024-41265

    A TLS certificate verification issue discovered in cortex v0.42.1 allows attackers to obtain sensitive information via the makeOperatorRequest function.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 9.1

    CRITICAL
    CVE-2024-41259

    Use of insecure hashing algorithm in the Gravatar's service in Navidrome v0.52.3 allows attackers to manipulate a user's account information.... Read more

    Affected Products : navidrome
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
Showing 20 of 290128 Results