The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.
For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.
Legal Disclaimer:
Here is where you can read the NVD legal disclaimer.
-
CVE-2024-10965 - A vulnerability classified as problematic was found in emqx neuron up to 2.10.0. Affected by this vulnerability is an unknown functionality of the file /api/v2/schema of the component JSON File Handler. The manipulation leads to information disclo... read CVE-2024-10965
Published: November 07, 2024; 12:15:06 PM -0500V3.1: 6.5 MEDIUM
-
CVE-2024-11026 - A vulnerability was found in Intelligent Apps Freenow App 12.10.0 on Android. It has been rated as problematic. Affected by this issue is some unknown functionality of the file ch/qos/logback/core/net/ssl/SSL.java of the component Keystore Handler... read CVE-2024-11026
Published: November 08, 2024; 5:15:14 PM -0500V3.1: 7.4 HIGH
-
CVE-2024-11049 - A vulnerability classified as problematic has been found in ZKTeco ZKBio Time 9.0.1. Affected is an unknown function of the file /auth_files/photo/ of the component Image File Handler. The manipulation leads to direct request. It is possible to la... read CVE-2024-11049
Published: November 10, 2024; 1:15:03 AM -0500V3.1: 3.7 LOW
-
CVE-2024-11050 - A vulnerability was found in AMTT Hotel Broadband Operation System up to 3.0.3.151204 and classified as problematic. This issue affects some unknown processing of the file /language.php. The manipulation of the argument LangID/LangName/LangEName l... read CVE-2024-11050
Published: November 10, 2024; 2:15:03 AM -0500V3.1: 5.4 MEDIUM
-
CVE-2024-11070 - A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS 5.202406.d. This issue affects some unknown processing of the file /admin/cmsTagType/save of the component Tag Type Handler. The manipulation of the argument... read CVE-2024-11070
Published: November 11, 2024; 10:15:04 AM -0500V3.1: 5.4 MEDIUM
-
CVE-2024-11078 - A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument e leads to cross site scripti... read CVE-2024-11078
Published: November 11, 2024; 3:15:17 PM -0500V3.1: 5.4 MEDIUM
-
CVE-2024-11096 - A vulnerability, which was classified as critical, was found in code-projects Task Manager 1.0. This affects an unknown part of the file /newProject.php. The manipulation of the argument projectName leads to sql injection. It is possible to initia... read CVE-2024-11096
Published: November 11, 2024; 8:15:03 PM -0500V3.1: 6.5 MEDIUM
-
CVE-2024-11485 - A vulnerability, which was classified as critical, has been found in Code4Berry Decoration Management System 1.0. Affected by this issue is some unknown functionality of the file /decoration/admin/userregister.php of the component User Handler. Th... read CVE-2024-11485
Published: November 20, 2024; 11:15:19 AM -0500V3.1: 8.1 HIGH
-
CVE-2024-11484 - A vulnerability classified as critical was found in Code4Berry Decoration Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /decoration/admin/update_image.php of the component User Image Handler. The man... read CVE-2024-11484
Published: November 20, 2024; 11:15:19 AM -0500V3.1: 8.8 HIGH
-
CVE-2024-51208 - File Upload vulnerability in change-image.php in Anuj Kumar's Boat Booking System version 1.0 allows local attackers to upload a malicious PHP script via the Image Upload Mechanism parameter.
Published: November 20, 2024; 10:15:08 AM -0500V3.1: 7.2 HIGH
-
CVE-2024-10872 - The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `template-post-custom-field` block in all versions up to, and including, 2.0.12 due to insufficient input sanitization and output escaping. Thi... read CVE-2024-10872
Published: November 20, 2024; 6:15:04 AM -0500V3.1: 5.4 MEDIUM
-
CVE-2018-9412 - In removeUnsynchronization of ID3.cpp there is a possible resource exhaustion due to improper input validation. This could lead to denial of service with no additional execution privileges needed. User interaction is needed for exploitation.
Published: November 19, 2024; 5:15:18 PM -0500V3.1: 5.5 MEDIUM
-
CVE-2024-6687 - The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible ... read CVE-2024-6687
Published: July 31, 2024; 10:15:02 PM -0400V3.1: 7.5 HIGH
-
CVE-2024-6698 - The FundEngine plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.0. This is due to the plugin not properly verifying user meta updated through the update_user_meta function. This makes it possible... read CVE-2024-6698
Published: August 01, 2024; 12:15:04 AM -0400 -
CVE-2024-5924 - Dropbox Desktop Folder Sharing Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Dropbox Desktop. User interaction is required to exploi... read CVE-2024-5924
Published: June 13, 2024; 4:15:16 PM -0400V3.1: 8.8 HIGH
-
CVE-2018-9411 - In decrypt of ClearKeyCasPlugin.cpp there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation.
Published: November 19, 2024; 5:15:18 PM -0500V3.1: 8.8 HIGH
-
CVE-2018-9410 - In analyzeAxes of FontUtils.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Published: November 19, 2024; 4:15:05 PM -0500V3.1: 5.5 MEDIUM
-
CVE-2024-53069 - In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: fix a NULL-pointer dereference Some SCM calls can be invoked with __scm being NULL (the driver may not have been and will not be probed as there's no SCM en... read CVE-2024-53069
Published: November 19, 2024; 1:15:26 PM -0500V3.1: 5.5 MEDIUM
-
CVE-2024-53076 - In the Linux kernel, the following vulnerability has been resolved: iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() If per_time_scales[i] or per_time_gains[i] kcalloc fails in the for loop of iio_gts_bui... read CVE-2024-53076
Published: November 19, 2024; 1:15:27 PM -0500V3.1: 5.5 MEDIUM
-
CVE-2024-53043 - In the Linux kernel, the following vulnerability has been resolved: mctp i2c: handle NULL header address daddr can be NULL if there is no neighbour table entry present, in that case the tx packet should be dropped. saddr will usually be set by ... read CVE-2024-53043
Published: November 19, 2024; 1:15:24 PM -0500V3.1: 5.5 MEDIUM