Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2024-56448

    Vulnerability of improper access control in the home screen widget module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Authorization
  • 7.5

    HIGH
    CVE-2024-54121

    Startup control vulnerability in the ability module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Misconfiguration
  • 5.3

    MEDIUM
    CVE-2024-12713

    The SureForms – Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.2 via the handle_export_form() function due to a missing capability check. This makes it possible... Read more

    Affected Products : sureforms
    • Published: Jan. 08, 2025
    • Modified: Jul. 11, 2025
    • Vuln Type: Information Disclosure
  • 6.4

    MEDIUM
    CVE-2024-12521

    The Slotti Ajanvaraus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slotti-embed-ga' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied at... Read more

    Affected Products :
    • Published: Jan. 08, 2025
    • Modified: Jan. 08, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.4

    MEDIUM
    CVE-2024-12112

    The Easy Form Builder – WordPress plugin form builder: contact form, survey form, payment form, and custom form builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name' parameter of the 'add_form_Emsfb' AJAX action in all v... Read more

    Affected Products :
    • Published: Jan. 08, 2025
    • Modified: Jan. 08, 2025
    • Vuln Type: Cross-Site Scripting
  • 7.4

    HIGH
    CVE-2024-11916

    The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to unauthorized modification and retrieval of data due to a missing capability check on several functions in all versions up to, and including, 3.0.11. This makes it possi... Read more

    • Published: Jan. 08, 2025
    • Modified: Apr. 14, 2025
    • Vuln Type: Authorization
  • 8.8

    HIGH
    CVE-2024-11816

    The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to Remote Code Execution in version 3.0.11. This is due to a missing capability check on the 'wpext_handle_snippet_update' function. This makes it possible for authenticated a... Read more

    • Published: Jan. 08, 2025
    • Modified: Jan. 17, 2025
    • Vuln Type: Authentication
  • 7.8

    HIGH
    CVE-2024-56447

    Vulnerability of improper permission control in the window management module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Authorization
  • 7.5

    HIGH
    CVE-2024-56446

    Vulnerability of variables not being initialized in the notification module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Misconfiguration
  • 5.3

    MEDIUM
    CVE-2024-56445

    Instruction authentication bypass vulnerability in the Findnetwork module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Authentication
  • 7.5

    HIGH
    CVE-2024-56444

    Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Information Disclosure
  • 7.5

    HIGH
    CVE-2024-56443

    Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Information Disclosure
  • 7.5

    HIGH
    CVE-2024-56442

    Vulnerability of native APIs not being implemented in the NFC service module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Misconfiguration
  • 5.9

    MEDIUM
    CVE-2024-56441

    Race condition vulnerability in the Bastet module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Race Condition
  • 7.5

    HIGH
    CVE-2024-56440

    Permission control vulnerability in the Connectivity module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Authorization
  • 7.5

    HIGH
    CVE-2024-56439

    Access control vulnerability in the identity authentication module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Authentication
  • 7.5

    HIGH
    CVE-2024-56438

    Vulnerability of improper memory address protection in the HUKS module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Memory Corruption
  • 7.5

    HIGH
    CVE-2024-56437

    Vulnerability of input parameters not being verified in the widget framework module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Denial of Service
  • 5.9

    MEDIUM
    CVE-2024-54120

    Race condition vulnerability in the distributed notification module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Race Condition
  • 6.9

    MEDIUM
    CVE-2024-47934

    Improper Input Validation vulnerability in Management Program in TXOne Networks Portable Inspector and Portable Inspector Pro Edition allows remote attacker to crash management service. The Denial of Service situation can be resolved by restarting the man... Read more

    Affected Products :
    • Published: Jan. 08, 2025
    • Modified: Jan. 08, 2025
    • Vuln Type: Denial of Service
Showing 20 of 293493 Results