Latest CVE Feed
-
9.8
CRITICALCVE-2022-45806
Missing Authorization vulnerability in Strategy11 Form Builder Team Formidable Forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Formidable Forms: from n/a through 5.5.4.... Read more
- Published: Dec. 13, 2024
- Modified: Feb. 05, 2025
-
5.3
MEDIUMCVE-2022-44578
Missing Authorization vulnerability in Pierre JEHAN Owl Carousel allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Owl Carousel: from n/a through 0.5.3.... Read more
Affected Products : owl_carousel- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
4.3
MEDIUMCVE-2022-43472
Missing Authorization vulnerability in StylemixThemes eRoom – Zoom Meetings & Webinar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects eRoom – Zoom Meetings & Webinar: from n/a through 1.4.6.... Read more
Affected Products :- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
7.2
HIGHCVE-2024-55889
phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an <iframe> elemen... Read more
Affected Products : phpmyfaq- Published: Dec. 13, 2024
- Modified: Aug. 14, 2025
-
6.5
MEDIUMCVE-2024-48008
Dell RecoverPoint for Virtual Machines 6.0.x contains a OS Command Injection vulnerability. An Low privileged remote attacker could potentially exploit this vulnerability leading to information disclosure ,allowing of unintended actions like reading files... Read more
Affected Products : recoverpoint_for_virtual_machines- Published: Dec. 13, 2024
- Modified: Feb. 04, 2025
-
9.8
CRITICALCVE-2024-48007
Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. A Remote unauthenticated attacker could potentially exploit this vulnerability by gaining access to the source code, easily retrieving these secrets and reu... Read more
Affected Products : recoverpoint_for_virtual_machines- Published: Dec. 13, 2024
- Modified: Mar. 13, 2025
-
9.8
CRITICALCVE-2024-38488
Dell RecoverPoint for Virtual Machines 6.0.x contains a vulnerability. An improper Restriction of Excessive Authentication vulnerability where a Network attacker could potentially exploit this vulnerability, leading to a brute force attack or a dictionary... Read more
Affected Products : recoverpoint_for_virtual_machines- Published: Dec. 13, 2024
- Modified: Feb. 04, 2025
-
8.8
HIGHCVE-2024-22461
Dell RecoverPoint for Virtual Machines 6.0.x contains an OS Command injection vulnerability. A low privileged remote attacker could potentially exploit this vulnerability by running any command as root, leading to gaining of root-level access and compromi... Read more
Affected Products : recoverpoint_for_virtual_machines- Published: Dec. 13, 2024
- Modified: Feb. 04, 2025
-
9.6
CRITICALCVE-2024-11986
Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resul... Read more
Affected Products :- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
6.1
MEDIUMCVE-2024-9608
The MyParcel plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.24.1. This makes it possible for unauthenticated attackers to... Read more
Affected Products :- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
10.0
CRITICALCVE-2024-21577
ComfyUI-Ace-Nodes is vulnerable to Code Injection. The ACE_ExpressionEval node contains an eval() in its entrypoint function that accepts arbitrary user-controlled data. A user can create a workflow that results in executing arbitrary code on the server.... Read more
Affected Products :- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
10.0
CRITICALCVE-2024-21576
ComfyUI-Bmad-Nodes is vulnerable to Code Injection. The issue stems from a validation bypass in the BuildColorRangeHSVAdvanced, FilterContour and FindContour custom nodes. In the entrypoint function to each node, there’s a call to eval which can be trigge... Read more
Affected Products :- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
6.4
MEDIUMCVE-2024-11827
The Out of the Block: OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ootb_query shortcode in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping on user supp... Read more
Affected Products :- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
8.3
HIGHCVE-2024-52066
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0... Read more
Affected Products : connext_professional- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
6.9
MEDIUMCVE-2024-52065
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional on non-Windows (Persistence Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 befo... Read more
Affected Products : connext_professional- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
6.9
MEDIUMCVE-2024-52064
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.... Read more
Affected Products : connext_professional- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
8.6
HIGHCVE-2024-52063
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from ... Read more
Affected Products : connext_professional- Published: Dec. 13, 2024
- Modified: Dec. 16, 2024
-
6.9
MEDIUMCVE-2024-52062
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.... Read more
Affected Products : connext_professional- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
8.3
HIGHCVE-2024-52061
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Queuing Service, Recording Service, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Profession... Read more
Affected Products : connext_professional- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
8.3
HIGHCVE-2024-52060
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service, Recording Service, Queuing Service, Observability Collector Service, Cloud Discovery Service) allows Buffer Overflow via Env... Read more
Affected Products : connext_professional- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024