Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 4.3

    MEDIUM
    CVE-2024-9889

    The ElementInvader Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.9 via the Page Loader widget. This makes it possible for authenticated attackers, with contributor-level... Read more

    • Published: Oct. 19, 2024
    • Modified: Nov. 01, 2024
  • 4.3

    MEDIUM
    CVE-2023-6243

    The EventON PRO - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.6.8. This is due to missing or incorrect nonce validation on the admin_test_email function. ... Read more

    Affected Products : eventon-lite
    • Published: Oct. 19, 2024
    • Modified: Nov. 01, 2024
  • 7.5

    HIGH
    CVE-2024-21536

    Versions of the package http-proxy-middleware before 2.0.7, from 3.0.0 and before 3.0.3 are vulnerable to Denial of Service (DoS) due to an UnhandledPromiseRejection error thrown by micromatch. An attacker could kill the Node.js process and crash the serv... Read more

    Affected Products : http-proxy-middleware
    • Published: Oct. 19, 2024
    • Modified: Nov. 01, 2024
  • 6.1

    MEDIUM
    CVE-2024-9219

    The WordPress Social Share Buttons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.19. This makes it possible for unauthen... Read more

    Affected Products : social_share_buttons
    • Published: Oct. 19, 2024
    • Modified: Nov. 01, 2024
  • 8.8

    HIGH
    CVE-2024-10131

    The `add_llm` function in `llm_app.py` in infiniflow/ragflow version 0.11.0 contains a remote code execution (RCE) vulnerability. The function uses user-supplied input `req['llm_factory']` and `req['llm_name']` to dynamically instantiate classes from vari... Read more

    Affected Products : ragflow
    • Published: Oct. 19, 2024
    • Modified: Nov. 01, 2024
  • 4.9

    MEDIUM
    CVE-2019-25218

    The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.3 due to insufficient escaping on the user supplied parameter and lack of sufficient p... Read more

    • Published: Oct. 19, 2024
    • Modified: Oct. 30, 2024
  • 4.3

    MEDIUM
    CVE-2024-43577

    Microsoft Edge (Chromium-based) Spoofing Vulnerability... Read more

    Affected Products : edge_chromium
    • Published: Oct. 18, 2024
    • Modified: Jan. 07, 2025
  • 9.1

    CRITICAL
    CVE-2024-37404

    Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution.... Read more

    Affected Products : connect_secure policy_secure
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 7.8

    HIGH
    CVE-2024-29821

    Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated privileges due to insecure ACL via unspecified attack vector.... Read more

    Affected Products : desktop_\&_server_management
    • Published: Oct. 18, 2024
    • Modified: Jul. 10, 2025
  • 7.8

    HIGH
    CVE-2024-29213

    Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated privileges due to insecure ACL via unspecified attack vector.... Read more

    Affected Products : desktop_\&_server_management
    • Published: Oct. 18, 2024
    • Modified: Jul. 10, 2025
  • 9.0

    HIGH
    CVE-2024-10130

    A vulnerability classified as critical was found in Tenda AC8 16.03.34.06. This vulnerability affects the function formSetRebootTimer of the file /goform/SetSysAutoRebbotCfg. The manipulation of the argument rebootTime leads to stack-based buffer overflow... Read more

    Affected Products : ac8_firmware ac8
    • Published: Oct. 18, 2024
    • Modified: Oct. 28, 2024
  • 6.5

    MEDIUM
    CVE-2024-10129

    A vulnerability classified as critical has been found in HFO4 shudong-share up to 2.4.7. This affects an unknown part of the file /includes/create_share.php of the component Share Handler. The manipulation of the argument fkey leads to sql injection. It i... Read more

    Affected Products : shudong-share shudong-share
    • Published: Oct. 18, 2024
    • Modified: Oct. 30, 2024
  • 5.1

    MEDIUM
    CVE-2024-10128

    A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file td.js.gz. The manipulation leads to risky cryptographic algorithm. The attack may be lau... Read more

    Affected Products : inner_rep_plus
    • Published: Oct. 18, 2024
    • Modified: Oct. 30, 2024
  • 9.0

    HIGH
    CVE-2024-10123

    A vulnerability was found in Tenda AC8 16.03.34.06. It has been declared as critical. Affected by this vulnerability is the function compare_parentcontrol_time of the file /goform/saveParentControlInfo. The manipulation of the argument time leads to stack... Read more

    Affected Products : ac8_firmware ac8
    • Published: Oct. 18, 2024
    • Modified: Oct. 28, 2024
  • 8.1

    HIGH
    CVE-2024-49361

    ACON is a widely-used library of tools for machine learning that focuses on adaptive correlation optimization. A potential vulnerability has been identified in the input validation process, which could lead to arbitrary code execution if exploited. This i... Read more

    Affected Products :
    • Published: Oct. 18, 2024
    • Modified: Oct. 21, 2024
  • 9.8

    CRITICAL
    CVE-2024-45944

    In J2eeFAST <=2.7, the backend function has unsafe filtering, which allows an attacker to trigger certain sensitive functions resulting in arbitrary code execution.... Read more

    Affected Products : j2eefast
    • Published: Oct. 18, 2024
    • Modified: Apr. 16, 2025
  • 5.1

    MEDIUM
    CVE-2024-10122

    A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been classified as problematic. Affected is an unknown function of the file /InnerRepPlus.html of the component Operator Details Form. The manipulation leads to missing password fi... Read more

    Affected Products : inner_rep_plus
    • Published: Oct. 18, 2024
    • Modified: Nov. 06, 2024
  • 9.8

    CRITICAL
    CVE-2024-10121

    A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initia... Read more

    Affected Products : radar
    • Published: Oct. 18, 2024
    • Modified: Oct. 30, 2024
  • 8.3

    HIGH
    CVE-2024-9593

    The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allo... Read more

    Affected Products : time_clock
    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 8.8

    HIGH
    CVE-2024-48016

    Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to inform... Read more

    Affected Products : secure_connect_gateway
    • Published: Oct. 18, 2024
    • Modified: Dec. 13, 2024
Showing 20 of 294836 Results