Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2024-24977

    Uncontrolled search path for some Intel(R) License Manager for FLEXlm product software before version 11.19.5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more

    Affected Products : license_manager_for_flexim
    • Published: Aug. 14, 2024
    • Modified: Sep. 12, 2024
  • 7.8

    HIGH
    CVE-2024-23908

    Insecure inherited permissions in some Flexlm License Daemons for Intel(R) FPGA software before version v11.19.5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more

    • Published: Aug. 14, 2024
    • Modified: Sep. 12, 2024
  • 9.8

    CRITICAL
    CVE-2024-43782

    This openedx-translations repository contains translation files from Open edX repositories to be kept in sync with Transifex. Before moving to pulling translations from the openedx-translations repository via openedx-atlas, translations in the edx-platfor... Read more

    Affected Products : openedx
    • Published: Aug. 23, 2024
    • Modified: Sep. 12, 2024
  • 7.8

    HIGH
    CVE-2024-43791

    RequestStore provides per-request global storage for Rack. The files published as part of request_store 1.3.2 have 0666 permissions, meaning that they are world-writable, which allows local users to execute arbitrary code. This version was published in 20... Read more

    Affected Products : request_store
    • Published: Aug. 23, 2024
    • Modified: Sep. 12, 2024
  • 9.3

    CRITICAL
    CVE-2024-23497

    Out-of-bounds write in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more

    • Published: Aug. 14, 2024
    • Modified: Sep. 12, 2024
  • 6.9

    MEDIUM
    CVE-2024-8112

    A vulnerability was found in thinkgem JeeSite 5.3. It has been rated as problematic. This issue affects some unknown processing of the file /js/a/login of the component Cookie Handler. The manipulation of the argument skinName leads to cross site scriptin... Read more

    Affected Products : jeesite
    • Published: Aug. 23, 2024
    • Modified: Sep. 12, 2024
  • 7.2

    HIGH
    CVE-2024-8113

    Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious event organizers to inject HTML tags into e-mail previews on settings page. The default Content Security Policy of pretix prevents execution of attacker-provided scripts,... Read more

    Affected Products : pretix
    • Published: Aug. 23, 2024
    • Modified: Sep. 12, 2024
  • 6.5

    MEDIUM
    CVE-2024-42364

    Homepage is a highly customizable homepage with Docker and service API integrations. The default setup of homepage 0.9.1 is vulnerable to DNS rebinding. Homepage is setup without certificate and authentication by default, leaving it to vulnerable to DNS r... Read more

    Affected Products : homepage
    • Published: Aug. 23, 2024
    • Modified: Sep. 12, 2024
  • 0.0

    NA
    CVE-2024-43826

    In the Linux kernel, the following vulnerability has been resolved: nfs: pass explicit offset/count to trace events nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations an... Read more

    Affected Products : linux_kernel
    • Published: Aug. 17, 2024
    • Modified: Sep. 12, 2024
  • 6.6

    MEDIUM
    CVE-2024-6840

    An improper authorization flaw exists in the Ansible Automation Controller. This flaw allows an attacker using the k8S API server to send an HTTP request with a service account token mounted via `automountServiceAccountToken: true`, resulting in privilege... Read more

    Affected Products :
    • Published: Sep. 12, 2024
    • Modified: Sep. 12, 2024
  • 6.5

    MEDIUM
    CVE-2024-42484

    ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An Out-of-Bound (OOB) vulnerability was discovered in the implementation of the ESP-NOW group type message because there is no check for the addrs_num field of the group type messag... Read more

    Affected Products : esp-now
    • Published: Sep. 12, 2024
    • Modified: Sep. 12, 2024
  • 7.8

    HIGH
    CVE-2024-45857

    Deserialization of untrusted data can occur in versions 2.4.0 or newer of the Cleanlab project, enabling a maliciously crafted datalab.pkl file to run arbitrary code on an end user’s system when the data directory is loaded.... Read more

    Affected Products :
    • Published: Sep. 12, 2024
    • Modified: Sep. 12, 2024
  • 7.3

    HIGH
    CVE-2024-23489

    Uncontrolled search path for some Intel(R) VROC software before version 8.6.0.1191 may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more

    Affected Products : virtual_raid_on_cpu
    • Published: Aug. 14, 2024
    • Modified: Sep. 12, 2024
  • 5.3

    MEDIUM
    CVE-2023-4027

    The Radio Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_settings function in versions up to, and including, 2.0.73. This makes it possible for unauthenticated attackers to up... Read more

    Affected Products : radio_player
    • Published: Aug. 17, 2024
    • Modified: Sep. 12, 2024
  • 6.7

    MEDIUM
    CVE-2024-45054

    Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do... Read more

    Affected Products : hwameistor
    • Published: Aug. 28, 2024
    • Modified: Sep. 12, 2024
  • 9.8

    CRITICAL
    CVE-2023-26324

    A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code.... Read more

    Affected Products : getapps
    • Published: Aug. 28, 2024
    • Modified: Sep. 12, 2024
  • 9.8

    CRITICAL
    CVE-2023-26322

    A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code.... Read more

    Affected Products : getapps
    • Published: Aug. 28, 2024
    • Modified: Sep. 12, 2024
  • 8.8

    HIGH
    CVE-2024-2166

    Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Forcepoint Email Security (Real Time Monitor modules) allows Reflected XSS.This issue affects Email Security: before 8.5.5 HF003.... Read more

    Affected Products : email_security
    • Published: Sep. 04, 2024
    • Modified: Sep. 12, 2024
  • 7.3

    HIGH
    CVE-2024-34019

    Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.... Read more

    Affected Products : snap_deploy
    • Published: Aug. 29, 2024
    • Modified: Sep. 12, 2024
  • 6.9

    MEDIUM
    CVE-2024-8461

    A vulnerability, which was classified as problematic, was found in D-Link DNS-320 2.02b01. This affects an unknown part of the file /cgi-bin/discovery.cgi of the component Web Management Interface. The manipulation leads to information disclosure. It is p... Read more

    Affected Products : dns-320_firmware dns-320
    • Published: Sep. 05, 2024
    • Modified: Sep. 12, 2024
Showing 20 of 292874 Results