Latest CVE Feed
-
4.3
MEDIUMCVE-2020-4014
The /profile/deleteWatch.do resource in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to remove another user's watching settings for a repository via an improper authorization vulnerability.... Read more
- Published: Jun. 01, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-3520
The Country State City Dropdown CF7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the tc_csca_patch_settings function in all versions up to, and including, 2.7.1. This makes it possible for au... Read more
Affected Products :- Published: May. 02, 2024
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-29784
IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: ... Read more
- Published: Jul. 26, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-29853
IBM Planning Analytics 2.0 could expose information that could be used to to create attacks by not validating the return values from some methods or functions. IBM X-Force ID: 205529.... Read more
- Published: Sep. 01, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2008-3367
Cross-site scripting (XSS) vulnerability in RTE_popup_link.asp in Web Wiz Rich Text Editor (RTE) 3.x and 4.x before 4.03 allows remote attackers to inject arbitrary web script or HTML via the email parameter.... Read more
Affected Products : web_wiz_rich_text_editor- Published: Jul. 30, 2008
- Modified: Apr. 09, 2025
-
4.3
MEDIUMCVE-2016-0471
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote attackers to affect confidentiality via unknown vectors related to Multichannel Framework.... Read more
- Published: Jan. 21, 2016
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2023-5522
Mattermost Mobile fails to limit the maximum number of Markdown elements in a post allowing an attacker to send a post with hundreds of emojis to a channel and freeze the mobile app of users when viewing that particular channel. ... Read more
- Published: Oct. 17, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-32604
Authorization Bypass Through User-Controlled Key vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5. ... Read more
Affected Products :- Published: Apr. 18, 2024
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-5498
Cross-Site Request Forgery (CSRF) in GitHub repository chiefonboarding/chiefonboarding prior to v2.0.47.... Read more
Affected Products : chiefonboarding- Published: Oct. 10, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21661
Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.... Read more
Affected Products : kubernetes- Published: Jun. 10, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-1024
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized sitemap generation due to a missing capability check on the regenerateSitemaps function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with sub... Read more
Affected Products : wp_meta_seo- Published: Feb. 28, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2008-6386
Cross-site scripting (XSS) vulnerability in showads.php in Z1Exchange 1.0 allows remote attackers to inject arbitrary web script or HTML via the id parameter.... Read more
Affected Products : z1exchange- Published: Mar. 02, 2009
- Modified: Apr. 09, 2025
-
4.3
MEDIUMCVE-2021-24164
In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the clien... Read more
Affected Products : ninja_forms- Published: Apr. 05, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-3126
The B2BKing plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'b2bkingdownloadpricelist' function in versions up to, and including, 4.6.00. This makes it possible for Authenticated attackers with su... Read more
Affected Products : b2bking- Published: Jun. 07, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-6799
The YITH Essential Kit for WooCommerce #1 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'activate_module', 'deactivate_module', and 'install_module' functions in all versions up to, and in... Read more
Affected Products : yith_essential_kit_for_woocommerce- Published: Jul. 19, 2024
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2011-3317
Multiple cross-site scripting (XSS) vulnerabilities in the Solution Engine in Cisco Secure Access Control Server (ACS) 5.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCtr78192.... Read more
- Published: May. 02, 2012
- Modified: Apr. 11, 2025
-
4.3
MEDIUMCVE-2023-22834
The Contour Service was not checking that users had permission to create an analysis for a given dataset. This could allow an attacker to clutter up Compass folders with extraneous analyses, that the attacker would otherwise not have permission to create.... Read more
Affected Products : contour- Published: Jun. 27, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2006-6824
Multiple cross-site scripting (XSS) vulnerabilities in Jim Hu and Chad Little PHP iCalendar 2.23 rc1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) getdate parameter in (a) day.php, (b) month.php, (c) year.php, (d) w... Read more
Affected Products : php_icalendar- Published: Dec. 29, 2006
- Modified: Apr. 09, 2025
-
4.3
MEDIUMCVE-2024-40723
The specific API in HWATAIServiSign Windows Version from CHANGING Information Technology does not properly validate the length of server-side inputs. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer ove... Read more
Affected Products : hwatai_servisign- Published: Aug. 02, 2024
- Modified: Aug. 09, 2024
-
4.3
MEDIUMCVE-2022-44548
There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing.... Read more
- Published: Nov. 09, 2022
- Modified: May. 01, 2025