Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.8

    CRITICAL
    CVE-2024-55078

    An arbitrary file upload vulnerability in the component /adminUser/updateImg of WukongCRM-11.0-JAVA v11.3.3 allows attackers to execute arbitrary code via uploading a crafted file.... Read more

    Affected Products :
    • Published: Jan. 03, 2025
    • Modified: Jan. 03, 2025
    • Vuln Type: Misconfiguration
  • 7.5

    HIGH
    CVE-2024-48814

    SQL Injection vulnerability in Silverpeas 6.4.1 allows a remote attacker to obtain sensitive information via the ViewType parameter of the findbywhereclause function... Read more

    Affected Products : silverpeas
    • Published: Jan. 03, 2025
    • Modified: May. 28, 2025
    • Vuln Type: Injection
  • 4.6

    MEDIUM
    CVE-2024-41780

    IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could could allow a physical user to obtain sensitive information due to not masking passwords during entry.... Read more

    Affected Products : linux_kernel windows jazz_foundation
    • Published: Jan. 03, 2025
    • Modified: Mar. 21, 2025
    • Vuln Type: Information Disclosure
  • 9.8

    CRITICAL
    CVE-2024-9140

    Moxa’s cellular routers, secure routers, and network security appliances are affected by a critical vulnerability, CVE-2024-9140. This vulnerability allows OS command injection due to improperly restricted commands, potentially enabling attackers to execu... Read more

    Affected Products : tn-4900_firmware
    • Published: Jan. 03, 2025
    • Modified: Jan. 03, 2025
    • Vuln Type: Injection
  • 8.6

    HIGH
    CVE-2024-9138

    Moxa’s cellular routers, secure routers, and network security appliances are affected by a high-severity vulnerability, CVE-2024-9138. This vulnerability involves hard-coded credentials, enabling an authenticated user to escalate privileges and gain root-... Read more

    • Published: Jan. 03, 2025
    • Modified: Jan. 03, 2025
    • Vuln Type: Authentication
  • 4.3

    MEDIUM
    CVE-2024-12132

    The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.4 due to missing validation on a user controlled key. This ... Read more

    Affected Products : wp_job_portal
    • Published: Jan. 03, 2025
    • Modified: Feb. 05, 2025
    • Vuln Type: Authorization
  • 9.3

    CRITICAL
    CVE-2025-22275

    iTerm2 3.5.6 through 3.5.10 before 3.5.11 sometimes allows remote attackers to obtain sensitive information from terminal commands by reading the /tmp/framer.txt file. This can occur for certain it2ssh and SSH Integration configurations, during remote log... Read more

    Affected Products : iterm2
    • Published: Jan. 03, 2025
    • Modified: Jun. 20, 2025
    • Vuln Type: Information Disclosure
  • 9.8

    CRITICAL
    CVE-2024-53842

    In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitat... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Memory Corruption
  • 7.8

    HIGH
    CVE-2024-53841

    In startListeningForDeviceStateChanges, there is a possible Permission Bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Authorization
  • 7.8

    HIGH
    CVE-2024-53840

    there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Authentication
  • 5.5

    MEDIUM
    CVE-2024-53839

    In GetCellInfoList() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitati... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Information Disclosure
  • 7.8

    HIGH
    CVE-2024-53838

    In Exynos_parsing_user_data_registered_itu_t_t35 of VendorVideoAPI.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interac... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Memory Corruption
  • 7.8

    HIGH
    CVE-2024-53837

    In prepare_response of lwis_periodic_io.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Memory Corruption
  • 6.7

    MEDIUM
    CVE-2024-53836

    In wbrc_bt_dev_write of wb_regon_coordinator.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Memory Corruption
  • 7.8

    HIGH
    CVE-2024-53835

    there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Authentication
  • 7.5

    HIGH
    CVE-2024-53834

    In sms_DisplayHexDumpOfPrivacyBuffer of sms_Utilities.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not need... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Information Disclosure
  • 7.8

    HIGH
    CVE-2024-53833

    In prepare_response_locked of lwis_transaction.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed fo... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Memory Corruption
  • 7.8

    HIGH
    CVE-2024-47032

    In construct_transaction_from_cmd of lwis_ioctl.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for e... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Memory Corruption
  • 7.8

    HIGH
    CVE-2024-11624

    there is a possible to add apps to bypass VPN due to Undeclared Permission . This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 03, 2025
    • Modified: Jul. 24, 2025
    • Vuln Type: Authorization
  • 7.5

    HIGH
    CVE-2025-0176

    A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/add_cart.php. The manipulation of the argument id/qty leads to sql i... Read more

    • Published: Jan. 03, 2025
    • Modified: Apr. 03, 2025
    • Vuln Type: Injection
Showing 20 of 293592 Results