Latest CVE Feed
-
7.5
HIGHCVE-2024-47949
In JetBrains TeamCity before 2024.07.3 path traversal allowed backup file write to arbitrary location... Read more
Affected Products : teamcity- Published: Oct. 08, 2024
- Modified: Oct. 11, 2024
-
7.5
HIGHCVE-2024-47948
In JetBrains TeamCity before 2024.07.3 path traversal leading to information disclosure was possible via server backups... Read more
Affected Products : teamcity- Published: Oct. 08, 2024
- Modified: Oct. 11, 2024
-
6.5
MEDIUMCVE-2024-47161
In JetBrains TeamCity before 2024.07.3 password could be exposed via Sonar runner REST API... Read more
Affected Products : teamcity- Published: Oct. 08, 2024
- Modified: Oct. 11, 2024
-
5.3
MEDIUMCVE-2024-45231
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password res... Read more
Affected Products : django- Published: Oct. 08, 2024
- Modified: Mar. 17, 2025
-
7.5
HIGHCVE-2024-45230
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.... Read more
Affected Products : django- Published: Oct. 08, 2024
- Modified: Mar. 17, 2025
-
8.0
HIGHCVE-2024-45880
A command injection vulnerability exists in Motorola CX2L router v1.0.2 and below. The vulnerability is present in the SetStationSettings function. The system directly invokes the system function to execute commands for setting parameters such as MAC addr... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
7.2
HIGHCVE-2024-45330
A use of externally-controlled format string in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.2 through 7.2.5 allows attacker to escalate its privileges via specially crafted requests.... Read more
- Published: Oct. 08, 2024
- Modified: Oct. 19, 2024
-
4.3
MEDIUMCVE-2024-33506
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiManager 7.4.2 and below, 7.2.5 and below, 7.0.12 and below allows a remote authenticated attacker assigned to an Administrative Domain (ADOM) to access device su... Read more
- Published: Oct. 08, 2024
- Modified: Jan. 21, 2025
-
6.4
MEDIUMCVE-2024-8482
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 1.3.982 due to insufficient input sanitization and output escaping. This makes it poss... Read more
Affected Products : royal_elementor_addons- Published: Oct. 08, 2024
- Modified: Jan. 15, 2025
-
4.3
MEDIUMCVE-2024-8431
The Photo Gallery, Images, Slider in Rbs Image Gallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajaxGetGalleryJson() function in all versions up to, and including, 3.2.21. This makes it pos... Read more
Affected Products : robo_gallery- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
6.1
MEDIUMCVE-2024-9207
The BuddyPress Docs plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.2.3. This makes it possible for unauthenticated att... Read more
Affected Products : buddypress_docs- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
7.3
HIGHCVE-2024-9005
CWE-502: Deserialization of Untrusted Data vulnerability exists that could allow code to be remotely executed on the server when unsafely deserialized data is posted to the web server.... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Mar. 13, 2025
-
9.8
CRITICALCVE-2024-8884
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists that could cause exposure of credentials when attacker has access to application on network over http... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
4.8
MEDIUMCVE-2024-8488
The Survey Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Survey fields in all versions up to, and including, 4.9.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers... Read more
Affected Products : survey_maker- Published: Oct. 08, 2024
- Modified: Apr. 23, 2025
-
6.1
MEDIUMCVE-2024-8629
The WooCommerce Multilingual & Multicurrency with WPML plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.3.7. This makes it ... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
3.3
LOWCVE-2024-8518
CWE-20: Improper Input Validation vulnerability exists that could cause a crash of the Zelio Soft 2 application when a specially crafted project file is loaded by an application user.... Read more
Affected Products : zelio_soft_2- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
6.4
MEDIUMCVE-2024-8433
The Easy Mega Menu Plugin for WordPress – ThemeHunk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘themehunk_megamenu_bg_image' parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and ou... Read more
- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
7.8
HIGHCVE-2024-8422
CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution, denial of service and loss of confidentiality & integrity when application user opens a malicious Zelio Soft 2 project file.... Read more
Affected Products : zelio_soft_2- Published: Oct. 08, 2024
- Modified: Oct. 16, 2024
-
7.3
HIGHCVE-2024-3506
A possible buffer overflow in selected cameras' drivers from XProtect Device Pack can allow an attacker with access to internal network to execute commands on Recording Server under strict conditions.... Read more
Affected Products :- Published: Oct. 08, 2024
- Modified: Oct. 10, 2024
-
9.8
CRITICALCVE-2024-8943
The LatePoint plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.0.12. This is due to insufficient verification on the user being supplied during the booking customer step. This makes it possible for unauthent... Read more
Affected Products : latepoint- Published: Oct. 08, 2024
- Modified: Feb. 20, 2025