Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 10.0

    CRITICAL
    CVE-2024-6886

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gitea Gitea Open Source Git Server allows Stored XSS.This issue affects Gitea Open Source Git Server: 1.22.0.... Read more

    Affected Products : gitea
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 8.8

    HIGH
    CVE-2023-5000

    The Horizontal scrolling announcements plugin for WordPress is vulnerable to SQL Injection via the plugin's 'hsas-shortcode' shortcode in versions up to, and including, 2.4 due to insufficient escaping on the user supplied parameter and lack of sufficient... Read more

    Affected Products :
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 6.7

    MEDIUM
    CVE-2024-5963

    Unquoted Executable Path vulnerability in Hitachi Device Manager on Windows (Device Manager Server component).This issue affects Hitachi Device Manager: before 8.8.7-00.... Read more

    Affected Products : device_manager
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 9.8

    CRITICAL
    CVE-2024-6782

    Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.... Read more

    Affected Products : calibre
    • Published: Aug. 06, 2024
    • Modified: Aug. 06, 2024
  • 9.8

    CRITICAL
    CVE-2024-7257

    The YayExtra – WooCommerce Extra Product Options plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_upload_file function in all versions up to, and including, 1.3.7. This makes it possible for un... Read more

    Affected Products :
    • Published: Aug. 03, 2024
    • Modified: Aug. 05, 2024
  • 7.1

    HIGH
    CVE-2024-22169

    WD Discovery versions prior to 5.0.589 contain a misconfiguration in the Node.js environment settings that could allow code execution by utilizing the 'ELECTRON_RUN_AS_NODE' environment variable. Any malicious application operating with standard user perm... Read more

    Affected Products : wd_discovery
    • Published: Aug. 02, 2024
    • Modified: Aug. 05, 2024
  • 7.5

    HIGH
    CVE-2024-28297

    SQL injection vulnerability in AzureSoft MyHorus 4.3.5 allows authenticated users to execute arbitrary SQL commands via unspecified vectors.... Read more

    Affected Products :
    • Published: Aug. 02, 2024
    • Modified: Aug. 05, 2024
  • 7.2

    HIGH
    CVE-2024-7291

    The JetFormBuilder plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3.4.1. This is due to improper restriction on user meta fields. This makes it possible for authenticated attackers, with administrator-le... Read more

    Affected Products :
    • Published: Aug. 03, 2024
    • Modified: Aug. 05, 2024
  • 7.5

    HIGH
    CVE-2024-41265

    A TLS certificate verification issue discovered in cortex v0.42.1 allows attackers to obtain sensitive information via the makeOperatorRequest function.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 4.8

    MEDIUM
    CVE-2024-25948

    Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 4.8

    MEDIUM
    CVE-2024-25947

    Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 4.4

    MEDIUM
    CVE-2024-38489

    Dell iDRAC Service Module version 5.3.0.0 and prior contains Out of bound write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service (partial) event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 5.8

    MEDIUM
    CVE-2024-38490

    Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 4.8

    MEDIUM
    CVE-2024-38481

    Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 8.0

    HIGH
    CVE-2024-39621

    Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CridioStudio ListingPro allows PHP Local File Inclusion.This issue affects ListingPro: from n/a through 2.9.3.... Read more

    Affected Products : listingpro
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 7.1

    HIGH
    CVE-2024-39656

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Uncanny Owl Tin Canny Reporting for LearnDash allows Reflected XSS.This issue affects Tin Canny Reporting for LearnDash: from n/a through 4.3.0.7.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 6.5

    MEDIUM
    CVE-2024-39655

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LiquidPoll LiquidPoll – Advanced Polls for Creators and Brands.This issue affects LiquidPoll – Advanced Polls for Creators and Brands: from n/a th... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 8.1

    HIGH
    CVE-2024-41956

    Soft Serve is a self-hostable Git server for the command line. Prior to 0.7.5, it is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git. The issue is that Soft Serve... Read more

    Affected Products : soft_serve
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 5.9

    MEDIUM
    CVE-2024-39660

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jordy Meow Photo Engine allows Stored XSS.This issue affects Photo Engine: from n/a through 6.3.1.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 7.1

    HIGH
    CVE-2024-39652

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPWeb Elite WooCommerce PDF Vouchers allows Reflected XSS.This issue affects WooCommerce PDF Vouchers: from n/a before 4.9.5.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
Showing 20 of 291157 Results