Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 4.1

    MEDIUM
    CVE-2024-1544

    Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the elliptic curve. Meaning k = r mod n. The division used during the reduction estimates a factor q_e by d... Read more

    Affected Products : wolfssl
    • Published: Aug. 27, 2024
    • Modified: Aug. 28, 2024
  • 5.1

    MEDIUM
    CVE-2024-5814

    A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server h... Read more

    Affected Products : wolfssl
    • Published: Aug. 27, 2024
    • Modified: Aug. 28, 2024
  • 7.5

    HIGH
    CVE-2024-45038

    Meshtastic device firmware is a firmware for meshtastic devices to run an open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices. Meshtastic device firmware is subject to a denial of serivce vulnerability in MQTT ... Read more

    • Published: Aug. 27, 2024
    • Modified: Aug. 28, 2024
  • 7.5

    HIGH
    CVE-2024-45049

    Hydra is a Continuous Integration service for Nix based projects. It is possible to trigger evaluations in Hydra without any authentication. Depending on the size of evaluations, this can impact the availability of systems. The problem can be fixed by app... Read more

    Affected Products :
    • Published: Aug. 27, 2024
    • Modified: Aug. 28, 2024
  • 6.4

    MEDIUM
    CVE-2024-45037

    The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormation templates during deployment to a customer’s AWS accou... Read more

    Affected Products :
    • Published: Aug. 27, 2024
    • Modified: Aug. 28, 2024
  • 5.3

    MEDIUM
    CVE-2024-7573

    The Relevanssi Live Ajax Search plugin for WordPress is vulnerable to argument injection in all versions up to, and including, 2.4. This is due to insufficient validation of input supplied via POST data in the 'search' function. This makes it possible for... Read more

    Affected Products :
    • Published: Aug. 28, 2024
    • Modified: Aug. 28, 2024
  • 5.9

    MEDIUM
    CVE-2024-7608

    An authenticated user can access the restricted files from NX, EX, FX, AX, IVX and CMS using path traversal.... Read more

    Affected Products :
    • Published: Aug. 27, 2024
    • Modified: Aug. 28, 2024
  • 6.1

    MEDIUM
    CVE-2024-39097

    There is an Open Redirect vulnerability in Gnuboard v6.0.4 and below via the `url` parameter in login path.... Read more

    Affected Products :
    • Published: Aug. 26, 2024
    • Modified: Aug. 27, 2024
  • 8.8

    HIGH
    CVE-2024-6978

    Cato Networks Windows SDP Client Local root certificates can be installed by low-privileged users.This issue affects SDP Client: before 5.10.28.... Read more

    Affected Products : cato_client
    • Published: Jul. 31, 2024
    • Modified: Aug. 27, 2024
  • 7.8

    HIGH
    CVE-2022-48913

    In the Linux kernel, the following vulnerability has been resolved: blktrace: fix use after free for struct blk_trace When tracing the whole disk, 'dropped' and 'msg' will be created under 'q->debugfs_dir' and 'bt->dir' is NULL, thus blk_trace_free() wo... Read more

    Affected Products : linux_kernel
    • Published: Aug. 22, 2024
    • Modified: Aug. 27, 2024
  • 7.8

    HIGH
    CVE-2022-48912

    In the Linux kernel, the following vulnerability has been resolved: netfilter: fix use-after-free in __nf_register_net_hook() We must not dereference @new_hooks after nf_hook_mutex has been released, because other threads might have freed our allocated ... Read more

    Affected Products : linux_kernel
    • Published: Aug. 22, 2024
    • Modified: Aug. 27, 2024
  • 9.8

    CRITICAL
    CVE-2024-8081

    A vulnerability classified as critical was found in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack ... Read more

    • Published: Aug. 22, 2024
    • Modified: Aug. 27, 2024
  • 8.8

    HIGH
    CVE-2024-8083

    A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file /php-ocls/classes/Master.php?f=pay_order. The manipulation of the ar... Read more

    Affected Products : online_computer_and_laptop_store
    • Published: Aug. 22, 2024
    • Modified: Aug. 27, 2024
  • 5.1

    MEDIUM
    CVE-2024-8084

    A vulnerability, which was classified as problematic, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file /php-ocls/classes/SystemSettings.php?f=update_settings of the component Setting Handler. The m... Read more

    Affected Products : online_computer_and_laptop_store
    • Published: Aug. 22, 2024
    • Modified: Aug. 27, 2024
  • 5.5

    MEDIUM
    CVE-2024-44937

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel-vbtn: Protect ACPI notify handler against recursion Since commit e2ffcda16290 ("ACPI: OSL: Allow Notify () handlers to run on all CPUs") ACPI notify handlers like th... Read more

    Affected Products : linux_kernel
    • Published: Aug. 26, 2024
    • Modified: Aug. 27, 2024
  • 7.8

    HIGH
    CVE-2024-44942

    In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC syzbot reports a f2fs bug as below: ------------[ cut here ]------------ kernel BUG at fs/f2fs/inline.c:258! CP... Read more

    Affected Products : linux_kernel
    • Published: Aug. 26, 2024
    • Modified: Aug. 27, 2024
  • 5.5

    MEDIUM
    CVE-2024-44935

    In the Linux kernel, the following vulnerability has been resolved: sctp: Fix null-ptr-deref in reuseport_add_sock(). syzbot reported a null-ptr-deref while accessing sk2->sk_reuseport_cb in reuseport_add_sock(). [0] The repro first creates a listener ... Read more

    Affected Products : linux_kernel
    • Published: Aug. 26, 2024
    • Modified: Aug. 27, 2024
  • 7.8

    HIGH
    CVE-2024-44932

    In the Linux kernel, the following vulnerability has been resolved: idpf: fix UAFs when destroying the queues The second tagged commit started sometimes (very rarely, but possible) throwing WARNs from net/core/page_pool.c:page_pool_disable_direct_recycl... Read more

    Affected Products : linux_kernel
    • Published: Aug. 26, 2024
    • Modified: Aug. 27, 2024
  • 5.5

    MEDIUM
    CVE-2024-44933

    In the Linux kernel, the following vulnerability has been resolved: bnxt_en : Fix memory out-of-bounds in bnxt_fill_hw_rss_tbl() A recent commit has modified the code in __bnxt_reserve_rings() to set the default RSS indirection table to default only whe... Read more

    Affected Products : linux_kernel
    • Published: Aug. 26, 2024
    • Modified: Aug. 27, 2024
  • 7.8

    HIGH
    CVE-2024-44934

    In the Linux kernel, the following vulnerability has been resolved: net: bridge: mcast: wait for previous gc cycles when removing port syzbot hit a use-after-free[1] which is caused because the bridge doesn't make sure that all previous garbage has been... Read more

    Affected Products : linux_kernel
    • Published: Aug. 26, 2024
    • Modified: Aug. 27, 2024
Showing 20 of 291659 Results