Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.5

    MEDIUM
    CVE-2024-12030

    The MDTF – Meta Data and Taxonomies Filter plugin for WordPress is vulnerable to SQL Injection via the 'key' attribute of the 'mdf_value' shortcode in all versions up to, and including, 1.3.3.5 due to insufficient escaping on the user supplied parameter a... Read more

    • Published: Jan. 08, 2025
    • Modified: Jan. 08, 2025
    • Vuln Type: Injection
  • 8.8

    HIGH
    CVE-2024-11271

    The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to modification of data due to a missing capability check on several functions in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers... Read more

    Affected Products : webinarpress
    • Published: Jan. 08, 2025
    • Modified: Jan. 17, 2025
    • Vuln Type: Authorization
  • 8.8

    HIGH
    CVE-2024-11270

    The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the 'sync-import-imgs' function and missing file type validation in all versions up to, and including, 1.33.24. ... Read more

    Affected Products : webinarpress
    • Published: Jan. 08, 2025
    • Modified: Jan. 17, 2025
    • Vuln Type: Misconfiguration
  • 4.8

    MEDIUM
    CVE-2025-21603

    Cross-site scripting vulnerability exists in MZK-DP300N firmware versions 1.05 and earlier. If an attacker logs in to the affected product and manipulates the device settings, an arbitrary script may be executed on the logged-in user's web browser when ac... Read more

    Affected Products :
    • Published: Jan. 08, 2025
    • Modified: Jan. 08, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.8

    MEDIUM
    CVE-2024-56456

    Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Denial of Service
  • 5.5

    MEDIUM
    CVE-2024-56455

    Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Denial of Service
  • 5.5

    MEDIUM
    CVE-2024-56454

    Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Denial of Service
  • 6.8

    MEDIUM
    CVE-2024-56453

    Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Denial of Service
  • 5.5

    MEDIUM
    CVE-2024-56452

    Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Denial of Service
  • 7.3

    HIGH
    CVE-2024-56451

    Integer overflow vulnerability during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Denial of Service
  • 6.3

    MEDIUM
    CVE-2024-56450

    Buffer overflow vulnerability in the component driver module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Memory Corruption
  • 7.5

    HIGH
    CVE-2024-56449

    Privilege escalation vulnerability in the Account module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Authorization
  • 7.5

    HIGH
    CVE-2024-56448

    Vulnerability of improper access control in the home screen widget module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Authorization
  • 7.5

    HIGH
    CVE-2024-54121

    Startup control vulnerability in the ability module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.... Read more

    Affected Products : harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Misconfiguration
  • 5.3

    MEDIUM
    CVE-2024-12713

    The SureForms – Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.2 via the handle_export_form() function due to a missing capability check. This makes it possible... Read more

    Affected Products : sureforms
    • Published: Jan. 08, 2025
    • Modified: Jul. 11, 2025
    • Vuln Type: Information Disclosure
  • 6.4

    MEDIUM
    CVE-2024-12521

    The Slotti Ajanvaraus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slotti-embed-ga' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied at... Read more

    Affected Products :
    • Published: Jan. 08, 2025
    • Modified: Jan. 08, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.4

    MEDIUM
    CVE-2024-12112

    The Easy Form Builder – WordPress plugin form builder: contact form, survey form, payment form, and custom form builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name' parameter of the 'add_form_Emsfb' AJAX action in all v... Read more

    Affected Products :
    • Published: Jan. 08, 2025
    • Modified: Jan. 08, 2025
    • Vuln Type: Cross-Site Scripting
  • 7.4

    HIGH
    CVE-2024-11916

    The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to unauthorized modification and retrieval of data due to a missing capability check on several functions in all versions up to, and including, 3.0.11. This makes it possi... Read more

    • Published: Jan. 08, 2025
    • Modified: Apr. 14, 2025
    • Vuln Type: Authorization
  • 8.8

    HIGH
    CVE-2024-11816

    The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to Remote Code Execution in version 3.0.11. This is due to a missing capability check on the 'wpext_handle_snippet_update' function. This makes it possible for authenticated a... Read more

    • Published: Jan. 08, 2025
    • Modified: Jan. 17, 2025
    • Vuln Type: Authentication
  • 7.8

    HIGH
    CVE-2024-56447

    Vulnerability of improper permission control in the window management module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more

    Affected Products : emui harmonyos
    • Published: Jan. 08, 2025
    • Modified: Jan. 13, 2025
    • Vuln Type: Authorization
Showing 20 of 293505 Results