Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.3

    MEDIUM
    CVE-2024-7447

    The Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'fnsf_af2_handel_file_upload' function in ... Read more

    Affected Products : funnelforms_free funnelforms
    • Published: Aug. 28, 2024
    • Modified: Sep. 13, 2024
  • 5.3

    MEDIUM
    CVE-2024-8195

    The Permalink Manager Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'debug_data', 'debug_query', and 'debug_redirect' functions in all versions up to, and including, 2.4.4. This makes it po... Read more

    Affected Products : permalink_manager_lite
    • Published: Aug. 28, 2024
    • Modified: Sep. 13, 2024
  • 5.5

    MEDIUM
    CVE-2024-20503

    A vulnerability in Cisco Duo Epic for Hyperdrive could allow an authenticated, local attacker to view sensitive information in cleartext on an affected system. This vulnerability is due to improper storage of an unencrypted registry key. A low-privileg... Read more

    Affected Products : duo_authentication_for_epic
    • Published: Sep. 04, 2024
    • Modified: Sep. 13, 2024
  • 9.8

    CRITICAL
    CVE-2024-8368

    A vulnerability was found in code-projects Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to... Read more

    • Published: Sep. 01, 2024
    • Modified: Sep. 13, 2024
  • 3.9

    LOW
    CVE-2024-45615

    A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. The problem is missing initialization of variables expected to be initialized (as arguments to other functions, etc.).... Read more

    Affected Products : enterprise_linux opensc
    • Published: Sep. 03, 2024
    • Modified: Sep. 13, 2024
  • 3.9

    LOW
    CVE-2024-45616

    A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. The following problems were caus... Read more

    Affected Products : enterprise_linux opensc
    • Published: Sep. 03, 2024
    • Modified: Sep. 13, 2024
  • 3.9

    LOW
    CVE-2024-45617

    A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. Insufficient or missing checking... Read more

    Affected Products : enterprise_linux opensc
    • Published: Sep. 03, 2024
    • Modified: Sep. 13, 2024
  • 6.4

    MEDIUM
    CVE-2024-8276

    The WPZOOM Portfolio Lite – Filterable Portfolio Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ attribute within the 'wp:wpzoom-blocks' Gutenberg block in all versions up to, and including, 1.4.4 due to insufficie... Read more

    Affected Products : wpzoom_portfolio
    • Published: Aug. 31, 2024
    • Modified: Sep. 13, 2024
  • 9.1

    CRITICAL
    CVE-2024-7856

    The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to unauthorized arbitrary file deletion due to a missing capability check on the removeTempFiles() function and insufficient path validation on the 'f... Read more

    • Published: Aug. 29, 2024
    • Modified: Sep. 13, 2024
  • 8.1

    HIGH
    CVE-2021-22509

    A vulnerability identified in storing and reusing information in Advance Authentication. This issue can lead to leakage of sensitive data to unauthorized user. The issue affects NetIQ Advance Authentication before 6.3.5.1... Read more

    • Published: Aug. 28, 2024
    • Modified: Sep. 13, 2024
  • 7.2

    HIGH
    CVE-2021-38120

    A vulnerability identified in Advance Authentication that allows bash command Injection in administrative controlled functionality of backup due to improper handling in provided command parameters. This issue affects NetIQ Advance Authentication version b... Read more

    • Published: Aug. 28, 2024
    • Modified: Sep. 13, 2024
  • 8.8

    HIGH
    CVE-2021-38121

    Insufficient or weak TLS protocol version identified in Advance authentication client server communication when specific service is accessed between devices.  This issue affects NetIQ Advance Authentication versions before 6.3.5.1... Read more

    • Published: Aug. 28, 2024
    • Modified: Sep. 13, 2024
  • 8.2

    HIGH
    CVE-2021-38122

    A Cross-Site Scripting vulnerable identified in NetIQ Advance Authentication that impacts the server functionality and disclose sensitive information. This issue affects NetIQ Advance Authentication before 6.3.5.1... Read more

    • Published: Aug. 28, 2024
    • Modified: Sep. 13, 2024
  • 6.3

    MEDIUM
    CVE-2021-22529

    A vulnerability identified in NetIQ Advance Authentication that leaks sensitive server information. This issue affects NetIQ Advance Authentication version before 6.3.5.1... Read more

    • Published: Aug. 28, 2024
    • Modified: Sep. 13, 2024
  • 7.8

    HIGH
    CVE-2024-43758

    Illustrator versions 28.6, 27.9.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open ... Read more

    Affected Products : macos windows illustrator
    • Published: Sep. 13, 2024
    • Modified: Sep. 13, 2024
  • 5.5

    MEDIUM
    CVE-2024-45111

    Illustrator versions 28.6, 27.9.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this iss... Read more

    Affected Products : macos windows illustrator
    • Published: Sep. 13, 2024
    • Modified: Sep. 13, 2024
  • 9.9

    CRITICAL
    CVE-2021-22530

    A vulnerability identified in NetIQ Advance Authentication that doesn't enforce account lockout when brute force attack is performed on API based login. This issue may lead to user account compromise if successful or may impact server performance. This is... Read more

    • Published: Aug. 28, 2024
    • Modified: Sep. 13, 2024
  • 5.5

    MEDIUM
    CVE-2024-43759

    Illustrator versions 28.6, 27.9.5 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a DoS con... Read more

    Affected Products : macos windows illustrator
    • Published: Sep. 13, 2024
    • Modified: Sep. 13, 2024
  • 7.8

    HIGH
    CVE-2024-43756

    Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that ... Read more

    Affected Products : macos windows photoshop
    • Published: Sep. 13, 2024
    • Modified: Sep. 13, 2024
  • 7.8

    HIGH
    CVE-2024-43760

    Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a vict... Read more

    Affected Products : macos windows photoshop
    • Published: Sep. 13, 2024
    • Modified: Sep. 13, 2024
Showing 20 of 292731 Results