Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.2

    HIGH
    CVE-2024-7291

    The JetFormBuilder plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3.4.1. This is due to improper restriction on user meta fields. This makes it possible for authenticated attackers, with administrator-le... Read more

    Affected Products :
    • Published: Aug. 03, 2024
    • Modified: Aug. 05, 2024
  • 7.5

    HIGH
    CVE-2024-28297

    SQL injection vulnerability in AzureSoft MyHorus 4.3.5 allows authenticated users to execute arbitrary SQL commands via unspecified vectors.... Read more

    Affected Products :
    • Published: Aug. 02, 2024
    • Modified: Aug. 05, 2024
  • 9.8

    CRITICAL
    CVE-2024-7257

    The YayExtra – WooCommerce Extra Product Options plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_upload_file function in all versions up to, and including, 1.3.7. This makes it possible for un... Read more

    Affected Products :
    • Published: Aug. 03, 2024
    • Modified: Aug. 05, 2024
  • 7.5

    HIGH
    CVE-2024-41265

    A TLS certificate verification issue discovered in cortex v0.42.1 allows attackers to obtain sensitive information via the makeOperatorRequest function.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 9.1

    CRITICAL
    CVE-2024-41259

    Use of insecure hashing algorithm in the Gravatar's service in Navidrome v0.52.3 allows attackers to manipulate a user's account information.... Read more

    Affected Products : navidrome
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 4.8

    MEDIUM
    CVE-2024-25948

    Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 4.8

    MEDIUM
    CVE-2024-25947

    Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 4.4

    MEDIUM
    CVE-2024-38489

    Dell iDRAC Service Module version 5.3.0.0 and prior contains Out of bound write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service (partial) event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 5.8

    MEDIUM
    CVE-2024-38490

    Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 4.8

    MEDIUM
    CVE-2024-38481

    Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 9.4

    CRITICAL
    CVE-2024-7093

    Dispatch's notification service uses Jinja templates to generate messages to users. Jinja permits code execution within blocks, which were neither properly sanitized nor sandboxed. This vulnerability enables users to construct command line scripts in thei... Read more

    Affected Products : dispatch
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 6.5

    MEDIUM
    CVE-2024-39665

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in YMC Filter & Grids allows Stored XSS.This issue affects Filter & Grids: from n/a through 2.9.2.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 6.5

    MEDIUM
    CVE-2024-39661

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ExtendThemes Kubio AI Page Builder.This issue affects Kubio AI Page Builder: from n/a through 2.2.4.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 5.3

    MEDIUM
    CVE-2024-6567

    The Ebook Store plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 5.8001. This is due to the plugin utilizing fpdi-protection and not preventing direct access to test files that have display_errors set to tru... Read more

    Affected Products : ebook_store
    • Published: Aug. 02, 2024
    • Modified: Aug. 02, 2024
  • 8.8

    HIGH
    CVE-2024-39634

    Improper Privilege Management vulnerability in IdeaBox PowerPack Pro for Elementor allows Privilege Escalation.This issue affects PowerPack Pro for Elementor: from n/a through 2.10.14.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 8.0

    HIGH
    CVE-2023-52209

    Improper Privilege Management vulnerability in WPForms, LLC. WPForms User Registration allows Privilege Escalation.This issue affects WPForms User Registration: from n/a through 2.1.0.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 8.8

    HIGH
    CVE-2024-3238

    The WordPress Menu Plugin — Superfly Responsive Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.0.29. This is due to missing or incorrect nonce validation on the ajax_handle_delete_icons() func... Read more

    Affected Products :
    • Published: Aug. 02, 2024
    • Modified: Aug. 02, 2024
  • 9.8

    CRITICAL
    CVE-2024-38770

    Improper Privilege Management vulnerability in Revmakx Backup and Staging by WP Time Capsule allows Privilege Escalation, Authentication Bypass.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.20.... Read more

    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 8.3

    HIGH
    CVE-2024-39636

    Deserialization of Untrusted Data vulnerability in CodeSolz Better Find and Replace.This issue affects Better Find and Replace: from n/a through 1.6.1.... Read more

    Affected Products :
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 5.5

    MEDIUM
    CVE-2024-39630

    Deserialization of Untrusted Data vulnerability in MotoPress Timetable and Event Schedule allows Object Injection.This issue affects Timetable and Event Schedule: from n/a through 2.4.13.... Read more

    Affected Products : timetable_and_event_schedule
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
Showing 20 of 289973 Results