Latest CVE Feed
-
3.7
LOWCVE-2024-46989
spicedb is an Open Source, Google Zanzibar-inspired permissions database to enable fine-grained authorization for customer applications. Multiple caveats over the same indirect subject type on the same relation can result in no permission being returned w... Read more
Affected Products : spicedb- Published: Sep. 18, 2024
- Modified: Sep. 20, 2024
-
7.5
HIGHCVE-2024-45601
Mesop is a Python-based UI framework designed for rapid web apps development. A vulnerability has been discovered and fixed in Mesop that could potentially allow unauthorized access to files on the server hosting the Mesop application. The vulnerability w... Read more
Affected Products :- Published: Sep. 18, 2024
- Modified: Sep. 20, 2024
-
9.8
CRITICALCVE-2024-44542
SQL Injection vulnerability in todesk v.1.1 allows a remote attacker to execute arbitrary code via the /todesk.com/news.html parameter.... Read more
Affected Products : todesk- Published: Sep. 18, 2024
- Modified: Sep. 20, 2024
-
9.3
CRITICALCVE-2024-7785
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ece Software Electronic Ticket System allows Reflected XSS, Cross-Site Scripting (XSS).This issue affects Electronic Ticket System: before 2024.08... Read more
Affected Products :- Published: Sep. 19, 2024
- Modified: Sep. 20, 2024
-
8.7
HIGHCVE-2024-7736
A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.... Read more
Affected Products : 3dexperience- Published: Sep. 19, 2024
- Modified: Sep. 20, 2024
-
5.0
MEDIUMCVE-2024-46990
Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `1... Read more
Affected Products : directus- Published: Sep. 18, 2024
- Modified: Sep. 20, 2024
-
9.8
CRITICALCVE-2024-46049
Tenda O6 V3.0 firmware V1.0.0.7(2054) contains a stack overflow vulnerability in the formexeCommand function.... Read more
- Published: Sep. 13, 2024
- Modified: Sep. 20, 2024
-
9.8
CRITICALCVE-2024-46048
Tenda FH451 v1.0.0.9 has a command injection vulnerability in the formexeCommand function i... Read more
- Published: Sep. 13, 2024
- Modified: Sep. 20, 2024
-
7.5
HIGHCVE-2024-46047
Tenda FH451 v1.0.0.9 has a stack overflow vulnerability in the fromDhcpListClient function.... Read more
- Published: Sep. 13, 2024
- Modified: Sep. 20, 2024
-
9.8
CRITICALCVE-2024-46046
Tenda FH451 v1.0.0.9 has a stack overflow vulnerability located in the RouteStatic function.... Read more
- Published: Sep. 13, 2024
- Modified: Sep. 20, 2024
-
9.8
CRITICALCVE-2024-46044
CH22 V1.0.0.6(468) has a stack overflow vulnerability located in the fromqossetting function.... Read more
- Published: Sep. 13, 2024
- Modified: Sep. 20, 2024
-
5.9
MEDIUMCVE-2024-45040
gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.11.0, commitments to private witnesses in Groth16 as implemented break the zero-knowledge property. The vulnerability affects only Groth16 proofs with com... Read more
- Published: Sep. 06, 2024
- Modified: Sep. 20, 2024
-
6.2
MEDIUMCVE-2024-45039
gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Versions prior to 0.11.0 have a soundness issue - in case of multiple commitments used inside the circuit the prover is able to choose all but the last commitment. As gnark ... Read more
- Published: Sep. 06, 2024
- Modified: Sep. 20, 2024
-
8.8
HIGHCVE-2024-7717
The WP Events Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter in all versions up to, and including, 2.1.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on t... Read more
Affected Products : wp_events_manager- Published: Aug. 31, 2024
- Modified: Sep. 20, 2024
-
5.3
MEDIUMCVE-2022-4100
The WP Cerber Security plugin for WordPress is vulnerable to IP Protection bypass in versions up to, and including 9.4 due to the plugin improperly checking for a visitor's IP address. This makes it possible for an attacker whose IP address has been block... Read more
- Published: Aug. 31, 2024
- Modified: Sep. 20, 2024
-
5.3
MEDIUMCVE-2022-4536
The IP Vault – WP Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restr... Read more
Affected Products : ip-vault-wp-firewall- Published: Aug. 31, 2024
- Modified: Sep. 20, 2024
-
7.8
HIGHCVE-2024-38210
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability... Read more
Affected Products : edge_chromium- Published: Aug. 22, 2024
- Modified: Sep. 19, 2024
-
7.8
HIGHCVE-2024-38209
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability... Read more
Affected Products : edge_chromium- Published: Aug. 22, 2024
- Modified: Sep. 19, 2024
-
6.1
MEDIUM- Published: Aug. 22, 2024
- Modified: Sep. 19, 2024
-
6.3
MEDIUMCVE-2024-38207
Microsoft Edge (HTML-based) Memory Corruption Vulnerability... Read more
Affected Products : edge_chromium- Published: Aug. 23, 2024
- Modified: Sep. 19, 2024