Latest CVE Feed
-
4.3
MEDIUMCVE-2023-23616
Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, when submitting a membership request, there is no character limit for the reason provided with the re... Read more
Affected Products : discourse- Published: Jan. 28, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2010-4520
Multiple cross-site scripting (XSS) vulnerabilities in the Views module 6.x before 6.x-2.11 for Drupal allow remote attackers to inject arbitrary web script or HTML via (1) a URL or (2) an aggregator feed title.... Read more
- Published: Dec. 23, 2010
- Modified: Apr. 11, 2025
-
4.3
MEDIUMCVE-2022-24343
In JetBrains YouTrack before 2021.4.31698, a custom logo could be set by a user who has read-only permissions.... Read more
Affected Products : youtrack- Published: Feb. 25, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-1555
IBM API Connect 5.0.0.0 through 5.0.7.2 could allow an authenticated user to generate an API token when not subscribed to the application plan. IBM X-Force ID: 131545.... Read more
Affected Products : api_connect- Published: Sep. 25, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2023-0689
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_first_name' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to... Read more
Affected Products : metform_elementor_contact_form_builder- Published: Aug. 31, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-24463
Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.... Read more
Affected Products : thunderbolt_dch_driver- Published: Feb. 14, 2024
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-0829
The Comments Extra Fields For Post,Pages and CPT plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 5.0. This is due to missing or incorrect capability checks on several ajax actions. This makes it possible f... Read more
- Published: Mar. 13, 2024
- Modified: Mar. 11, 2025
-
4.3
MEDIUMCVE-2021-34777
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause i... Read more
Affected Products : business_220-8t-e-2g_firmware business_220-8p-e-2g_firmware business_220-8fp-e-2g_firmware business_220-16t-2g_firmware business_220-16p-2g_firmware business_220-24t-4g_firmware business_220-24p-4g_firmware business_220-24fp-4g_firmware business_220-48t-4g_firmware business_220-48p-4g_firmware +22 more products- Published: Oct. 06, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-5525
The Limit Login Attempts Reloaded WordPress plugin before 2.25.26 is missing authorization on the `toggle_auto_update` AJAX action, allowing any user with a valid nonce to toggle the auto-update status of the plugin.... Read more
Affected Products : limit_login_attempts_reloaded- Published: Nov. 27, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-1342
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ucss_connect function. This makes it possible for ... Read more
- Published: Mar. 10, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-16639
Tor Browser on Windows before 8.0 allows remote attackers to bypass the intended anonymity feature and discover a client IP address, a different vulnerability than CVE-2017-16541. User interaction is required to trigger this vulnerability.... Read more
- Published: Sep. 14, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-42768
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.... Read more
- Published: Dec. 06, 2022
- Modified: Apr. 23, 2025
-
4.3
MEDIUMCVE-2023-2020
Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host.... Read more
- Published: Apr. 18, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-5411
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_af2_save_post function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, wi... Read more
- Published: Nov. 22, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-6633
The Site Notes WordPress plugin through 2.0.0 does not have CSRF checks in some of its functionalities, which could allow attackers to make logged in users perform unwanted actions, such as deleting administration notes, via CSRF attacks... Read more
Affected Products : side_notes- Published: Jan. 29, 2024
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-51649
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. When submitting a Job to run via a Job Button, only the model-level `extras.run_job` per... Read more
Affected Products : nautobot- Published: Dec. 22, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-36660
A vulnerability was found in paxswill EVE Ship Replacement Program 0.12.11. It has been rated as problematic. This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads ... Read more
Affected Products : eve_ship_replacement_program- Published: Feb. 06, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-0484
The Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via... Read more
Affected Products : contact_form_7_widget_for_elementor_page_builder_\&_gutenberg_blocks- Published: Mar. 27, 2023
- Modified: Feb. 19, 2025
-
4.3
MEDIUMCVE-2023-51451
Symbolicator is a service used in Sentry. Starting in Symbolicator version 0.3.3 and prior to version 21.12.1, an attacker could make Symbolicator send GET HTTP requests to arbitrary URLs with internal IP addresses by using an invalid protocol. The respon... Read more
Affected Products : symbolicator- Published: Dec. 22, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-12249
The GS Insever Portfolio plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_settings() function in all versions up to, and including, 1.4.5. This makes it possible for authenticated attack... Read more
Affected Products : gs_insever_portfolio- Published: Jan. 09, 2025
- Modified: Jan. 09, 2025
- Vuln Type: Authorization