Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.0

    HIGH
    CVE-2023-52209

    Improper Privilege Management vulnerability in WPForms, LLC. WPForms User Registration allows Privilege Escalation.This issue affects WPForms User Registration: from n/a through 2.1.0.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 6.5

    MEDIUM
    CVE-2024-39661

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ExtendThemes Kubio AI Page Builder.This issue affects Kubio AI Page Builder: from n/a through 2.2.4.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 9.4

    CRITICAL
    CVE-2024-7093

    Dispatch's notification service uses Jinja templates to generate messages to users. Jinja permits code execution within blocks, which were neither properly sanitized nor sandboxed. This vulnerability enables users to construct command line scripts in thei... Read more

    Affected Products : dispatch
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 8.8

    HIGH
    CVE-2024-39634

    Improper Privilege Management vulnerability in IdeaBox PowerPack Pro for Elementor allows Privilege Escalation.This issue affects PowerPack Pro for Elementor: from n/a through 2.10.14.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 5.3

    MEDIUM
    CVE-2024-6567

    The Ebook Store plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 5.8001. This is due to the plugin utilizing fpdi-protection and not preventing direct access to test files that have display_errors set to tru... Read more

    Affected Products : ebook_store
    • Published: Aug. 02, 2024
    • Modified: Aug. 02, 2024
  • 9.8

    CRITICAL
    CVE-2024-38770

    Improper Privilege Management vulnerability in Revmakx Backup and Staging by WP Time Capsule allows Privilege Escalation, Authentication Bypass.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.20.... Read more

    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 8.8

    HIGH
    CVE-2024-3238

    The WordPress Menu Plugin — Superfly Responsive Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.0.29. This is due to missing or incorrect nonce validation on the ajax_handle_delete_icons() func... Read more

    Affected Products :
    • Published: Aug. 02, 2024
    • Modified: Aug. 02, 2024
  • 6.5

    MEDIUM
    CVE-2024-39665

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in YMC Filter & Grids allows Stored XSS.This issue affects Filter & Grids: from n/a through 2.9.2.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 8.1

    HIGH
    CVE-2024-41956

    Soft Serve is a self-hostable Git server for the command line. Prior to 0.7.5, it is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git. The issue is that Soft Serve... Read more

    Affected Products : soft_serve
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 9.0

    HIGH
    CVE-2024-7331

    A vulnerability was found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as critical. Affected by this issue is the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to buffer overflow. The... Read more

    Affected Products : a3300r_firmware a3300r
    • Published: Aug. 01, 2024
    • Modified: Aug. 01, 2024
  • 8.1

    HIGH
    CVE-2024-6873

    It is possible to crash or redirect the execution flow of the ClickHouse server process from an unauthenticated vector by sending a specially crafted request to the ClickHouse server native interface. This redirection is limited to what is available withi... Read more

    Affected Products : clickhouse
    • Published: Aug. 01, 2024
    • Modified: Aug. 01, 2024
  • 9.6

    CRITICAL
    CVE-2024-41961

    Elektra is an opinionated Openstack Dashboard for Operators and Consumers of Openstack Services. A code injection vulnerability was found in the live search functionality of the Ruby on Rails based Elektra web application. An authenticated user can craft ... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 01, 2024
  • 7.3

    HIGH
    CVE-2024-6242

    A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute C... Read more

    Affected Products : 1756-en4tr_firmware
    • Published: Aug. 01, 2024
    • Modified: Aug. 01, 2024
  • 8.5

    HIGH
    CVE-2024-7358

    A vulnerability was found in Point B Ltd Getscreen Agent 2.19.6 on Windows. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file getscreen.msi of the component Installation. The manipulation leads to cre... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 01, 2024
  • 7.5

    HIGH
    CVE-2024-41255

    filestash v0.4 is configured to skip TLS certificate verification when using the FTPS protocol, possibly allowing attackers to execute a man-in-the-middle attack via the Init function of index.go.... Read more

    Affected Products :
    • Published: Jul. 31, 2024
    • Modified: Aug. 01, 2024
  • 9.8

    CRITICAL
    CVE-2024-6695

    it's possible for an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions. This is due to improper logic flow on the user registration process.... Read more

    Affected Products : profile_builder
    • Published: Jul. 31, 2024
    • Modified: Aug. 01, 2024
  • 8.3

    HIGH
    CVE-2024-42381

    os/linux/elf.rb in Homebrew brew before 4.2.20 uses ldd to load ELF files obtained from untrusted sources, which allows attackers to achieve code execution via an ELF file with a custom .interp section. NOTE: this code execution would occur during an un-s... Read more

    Affected Products :
    • Published: Jul. 31, 2024
    • Modified: Aug. 01, 2024
  • 7.1

    HIGH
    CVE-2024-41253

    goframe v2.7.2 is configured to skip TLS certificate verification, possibly allowing attackers to execute a man-in-the-middle attack via the gclient component.... Read more

    Affected Products :
    • Published: Jul. 31, 2024
    • Modified: Aug. 01, 2024
  • 4.7

    MEDIUM
    CVE-2024-39694

    Duende IdentityServer is an OpenID Connect and OAuth 2.x framework for ASP.NET Core. It is possible for an attacker to craft malicious Urls that certain functions in IdentityServer will incorrectly treat as local and trusted. If such a Url is returned as ... Read more

    Affected Products :
    • Published: Jul. 31, 2024
    • Modified: Aug. 01, 2024
  • 4.4

    MEDIUM
    CVE-2024-41951

    Pheonix App is a Python application designed to streamline various tasks, from managing files to playing mini-games. The issue is that the map of encoding/decoding languages are visible in code. The Problem was patched in 0.2.4.... Read more

    Affected Products :
    • Published: Jul. 31, 2024
    • Modified: Aug. 01, 2024
Showing 20 of 291009 Results