Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.3

    MEDIUM
    CVE-2024-38820

    The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.... Read more

    Affected Products : spring_framework
    • Published: Oct. 18, 2024
    • Modified: Nov. 29, 2024
  • 4.8

    MEDIUM
    CVE-2024-9892

    The Add Widget After Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authentica... Read more

    Affected Products : add_widget_after_content
    • Published: Oct. 18, 2024
    • Modified: Oct. 22, 2024
  • 6.4

    MEDIUM
    CVE-2024-9848

    The Product Customizer Light plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenti... Read more

    Affected Products : product_customizer_light
    • Published: Oct. 18, 2024
    • Modified: Oct. 22, 2024
  • 6.4

    MEDIUM
    CVE-2024-9452

    The Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, w... Read more

    Affected Products : branding
    • Published: Oct. 18, 2024
    • Modified: Oct. 22, 2024
  • 6.1

    MEDIUM
    CVE-2024-9383

    The Parcel Pro plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'action' parameter in all versions up to, and including, 1.8.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticat... Read more

    Affected Products : parcel_pro
    • Published: Oct. 18, 2024
    • Modified: Oct. 22, 2024
  • 6.1

    MEDIUM
    CVE-2024-9382

    The Gantry 4 Framework plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'override_id' parameter in all versions up to, and including, 4.1.21 due to insufficient input sanitization and output escaping. This makes it possible for... Read more

    Affected Products : gantry
    • Published: Oct. 18, 2024
    • Modified: Oct. 22, 2024
  • 6.4

    MEDIUM
    CVE-2024-9373

    The Elemenda plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 0.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers,... Read more

    Affected Products : elemenda
    • Published: Oct. 18, 2024
    • Modified: Oct. 22, 2024
  • 6.4

    MEDIUM
    CVE-2024-9366

    The Easy Menu Manager | WPZest plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authen... Read more

    Affected Products : easy_menu_manager
    • Published: Oct. 18, 2024
    • Modified: Oct. 22, 2024
  • 4.3

    MEDIUM
    CVE-2024-9364

    The SendGrid for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'wp_mailplus_clear_logs' function in all versions up to, and including, 1.4. This makes it possible for authenticated attac... Read more

    Affected Products : sendgrid
    • Published: Oct. 18, 2024
    • Modified: Oct. 22, 2024
  • 4.3

    MEDIUM
    CVE-2024-9361

    The Bulk images optimizer: Resize, optimize, convert to webp, rename … plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_configuration' function in all versions up to, and including, 2.0... Read more

    Affected Products : bulk_images_optimizer
    • Published: Oct. 18, 2024
    • Modified: Nov. 01, 2024
  • 6.1

    MEDIUM
    CVE-2024-9350

    The DPD Baltic Shipping plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search_value' parameter in all versions up to, and including, 1.2.83 due to insufficient input sanitization and output escaping. This makes it possible f... Read more

    Affected Products : dpd_baltic_shipping
    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 6.4

    MEDIUM
    CVE-2024-8916

    The Suki Sites Import plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated a... Read more

    Affected Products : suki_sites_import
    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 6.1

    MEDIUM
    CVE-2024-8790

    The Social Share With Floating Bar plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.0.3. This makes it possible for unauthe... Read more

    Affected Products : social_share_with_floating_bar
    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 6.1

    MEDIUM
    CVE-2024-8740

    The GetResponse Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.6. This makes it possible for unauthe... Read more

    Affected Products : getresponse_forms
    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 9.8

    CRITICAL
    CVE-2024-10119

    The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by sending crafted requests.... Read more

    Affected Products : wrtm326_firmware wrtm326
    • Published: Oct. 18, 2024
    • Modified: Nov. 01, 2024
  • 6.1

    MEDIUM
    CVE-2024-10049

    The Edit WooCommerce Templates plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for... Read more

    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 5.3

    MEDIUM
    CVE-2024-10040

    The Infinite-Scroll plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.2. This is due to missing or incorrect nonce validation on the process_ajax_edit and process_ajax_delete function. This makes it... Read more

    Affected Products : infinite-scroll
    • Published: Oct. 18, 2024
    • Modified: Nov. 01, 2024
  • 6.4

    MEDIUM
    CVE-2024-10014

    The Flat UI Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's flatbtn shortcode in version 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authe... Read more

    Affected Products : flat_ui_button
    • Published: Oct. 18, 2024
    • Modified: Oct. 29, 2024
  • 9.9

    CRITICAL
    CVE-2024-9264

    The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vu... Read more

    Affected Products : grafana
    • Published: Oct. 18, 2024
    • Modified: Mar. 14, 2025
  • 9.8

    CRITICAL
    CVE-2024-10118

    SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.... Read more

    Affected Products :
    • Published: Oct. 18, 2024
    • Modified: Oct. 18, 2024
Showing 20 of 294793 Results