Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.7

    MEDIUM
    CVE-2024-51521

    Input parameter verification vulnerability in the background service module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 5.5

    MEDIUM
    CVE-2024-51520

    Vulnerability of input parameters not being verified in the HDC module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 5.5

    MEDIUM
    CVE-2024-51519

    Vulnerability of input parameters not being verified in the HDC module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 06, 2024
  • 7.5

    HIGH
    CVE-2024-51518

    Vulnerability of message types not being verified in the advanced messaging modul Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 06, 2024
  • 5.5

    MEDIUM
    CVE-2024-51517

    Vulnerability of improper memory access in the phone service module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 06, 2024
  • 7.8

    HIGH
    CVE-2024-47255

    In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrary code execution with root permissions.... Read more

    Affected Products : access_commander
    • Published: Nov. 05, 2024
    • Modified: Sep. 04, 2025
  • 7.2

    HIGH
    CVE-2024-47254

    In 2N Access Commander versions 3.1.1.2 and prior, an Insufficient Verification of Data Authenticity vulnerability could allow an attacker to escalate their privileges and gain root access to the system.... Read more

    Affected Products : access_commander
    • Published: Nov. 05, 2024
    • Modified: Sep. 04, 2025
  • 7.2

    HIGH
    CVE-2024-47253

    In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker with administrative privileges to write files on the filesystem and potentially achieve arbitrary remote code execution. This vulnerability cannot be... Read more

    Affected Products : access_commander
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 9.8

    CRITICAL
    CVE-2024-10687

    The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons plugin for WordPress is vulnerable to time-based SQL Injection via the $collectedIds parameter in all versions up to, a... Read more

    Affected Products : contest_gallery
    • Published: Nov. 05, 2024
    • Modified: Nov. 08, 2024
  • 5.5

    MEDIUM
    CVE-2023-52920

    In the Linux kernel, the following vulnerability has been resolved: bpf: support non-r10 register spill/fill to/from stack in precision tracking Use instruction (jump) history to record instructions that performed register spill/fill to/from stack, rega... Read more

    Affected Products : linux_kernel
    • Published: Nov. 05, 2024
    • Modified: Jan. 09, 2025
  • 6.1

    MEDIUM
    CVE-2024-9667

    The Seriously Simple Podcasting plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.5.0. This makes it possible for unauthenti... Read more

    Affected Products : seriously_simple_podcasting
    • Published: Nov. 05, 2024
    • Modified: Nov. 08, 2024
  • 6.4

    MEDIUM
    CVE-2024-9443

    The Basticom Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated ... Read more

    Affected Products : framework
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 6.2

    MEDIUM
    CVE-2024-51516

    Permission control vulnerability in the ability module Impact: Successful exploitation of this vulnerability may cause features to function abnormally.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 6.2

    MEDIUM
    CVE-2024-51515

    Race condition vulnerability in the kernel network module Impact:Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 5.5

    MEDIUM
    CVE-2024-51514

    Vulnerability of pop-up windows belonging to no app in the VPN module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 5.5

    MEDIUM
    CVE-2024-51513

    Vulnerability of processes not being fully terminated in the VPN module Impact: Successful exploitation of this vulnerability will affect power consumption.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 6.2

    MEDIUM
    CVE-2024-51512

    Vulnerability of parameter type not being verified in the WantAgent module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 6.2

    MEDIUM
    CVE-2024-51511

    Vulnerability of parameter type not being verified in the WantAgent module Impact: Successful exploitation of this vulnerability may affect availability.... Read more

    Affected Products : harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 7.6

    HIGH
    CVE-2024-51510

    Out-of-bounds access vulnerability in the logo module Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more

    Affected Products : emui harmonyos
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
  • 8.8

    HIGH
    CVE-2024-10711

    The WooCommerce Report plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.1. This is due to missing or incorrect nonce validation on the settings update functionality. This makes it possible for unau... Read more

    Affected Products : woocommerce_report
    • Published: Nov. 05, 2024
    • Modified: Nov. 07, 2024
Showing 20 of 293632 Results