Latest CVE Feed
-
4.3
MEDIUMCVE-2025-5925
The Bunny’s Print CSS plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.95. This is due to missing or incorrect nonce validation on the pcss_options_subpanel() function. This makes it possible for una... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-6059
The Seraphinite Accelerator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.27.21. This is due to missing or incorrect nonce validation on the 'OnAdminApi_CacheOpBegin' function. This makes it possi... Read more
Affected Products : seraphinite_accelerator- Published: Jun. 14, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2022-35204
Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.... Read more
Affected Products : vite- Published: Aug. 18, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2025-30521
Cross-Site Request Forgery (CSRF) vulnerability in giangmd93 GP Back To Top allows Cross Site Request Forgery. This issue affects GP Back To Top: from n/a through 3.0.... Read more
Affected Products :- Published: Mar. 24, 2025
- Modified: Mar. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2015-0269
Directory traversal vulnerability in Contao before 3.2.19, and 3.4.x before 3.4.4 allows remote authenticated "back end" users to view files outside their file mounts or the document root via unspecified vectors.... Read more
- Published: May. 26, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2014-7139
Multiple cross-site scripting (XSS) vulnerabilities in the Contact Form DB (aka CFDB and contact-form-7-to-database-extension) plugin before 2.8.16 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) form or (2) enc par... Read more
Affected Products : contact_form_db- Published: Oct. 10, 2014
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2022-23995
Unprotected component vulnerability in StBedtimeModeAlarmReceiver in Wear OS 3.0 prior to Firmware update Feb-2022 Release allows untrusted applications to change bedtime mode without a proper permission.... Read more
Affected Products : wear_os- Published: Feb. 11, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2012-2011
Multiple cross-site scripting (XSS) vulnerabilities in HP Web Jetadmin 8.x allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.... Read more
Affected Products : web_jetadmin- Published: Jun. 13, 2012
- Modified: Apr. 11, 2025
-
4.3
MEDIUMCVE-2006-1377
Cross-site scripting (XSS) vulnerability in img.php in (1) EasyMoblog 0.5.1 and (2) CoMoblog 1.1 allows remote attackers to inject arbitrary web script or HTML via the i parameter.... Read more
- Published: Mar. 24, 2006
- Modified: Apr. 03, 2025
-
4.3
MEDIUMCVE-2024-10045
The Transients Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.6. This is due to missing or incorrect nonce validation on the process_actions function. This makes it possible for unauthent... Read more
Affected Products : transients_manager- Published: Oct. 23, 2024
- Modified: Oct. 25, 2024
-
4.3
MEDIUMCVE-2024-10365
The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.3 via the render function in modules/widge... Read more
Affected Products : the_plus_addons_for_elementor- Published: Nov. 20, 2024
- Modified: Nov. 26, 2024
-
4.3
MEDIUMCVE-2025-42987
SAP Manage Processing Rules (For Bank Statement) allows an attacker with basic privileges to edit shared rules of any user by tampering the request parameter. Due to missing authorization check, the attacker can edit rules that should be restricted, compr... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
-
4.3
MEDIUMCVE-2022-4931
The BackupWordPress plugin for WordPress is vulnerable to information disclosure in versions up to, and including 3.12. This is due to missing authorization on the heartbeat_received() function that triggers on WordPress heartbeat. This makes it possible ... Read more
Affected Products : backupwordpress- Published: Mar. 07, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2025-20214
A vulnerability in the Network Configuration Access Control Module (NACM) of Cisco IOS XE Software could allow an authenticated, remote attacker to obtain unauthorized read access to configuration or operational data. This vulnerability exists because ... Read more
Affected Products : ios_xe- Published: May. 07, 2025
- Modified: Aug. 05, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2019-11294
Cloud Foundry Cloud Controller API (CAPI), version 1.88.0, allows space developers to list all global service brokers, including service broker URLs and GUIDs, which should only be accessible to admins.... Read more
- Published: Dec. 19, 2019
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-40075
Laravel v11.x was discovered to contain an XML External Entity (XXE) vulnerability.... Read more
Affected Products :- Published: Jul. 22, 2024
- Modified: Dec. 02, 2024
-
4.3
MEDIUMCVE-2023-29422
Missing Authorization vulnerability in AlexaCRM Dynamics 365 Integration allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Dynamics 365 Integration: from n/a through 1.3.13.... Read more
Affected Products :- Published: Dec. 09, 2024
- Modified: Dec. 09, 2024
-
4.3
MEDIUMCVE-2014-8765
Multiple cross-site scripting (XSS) vulnerabilities in the Project Issue File Review module (PIFR) module 6.x-2.x before 6.x-2.17 for Drupal allow (1) remote attackers to inject arbitrary web script or HTML via a crafted patch, which triggers a PIFR clien... Read more
Affected Products : project_issue_file_review- Published: Oct. 14, 2014
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2024-11844
The IdeaPush plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the idea_push_taxonomy_save_routine function in all versions up to, and including, 8.71. This makes it possible for authenticated att... Read more
Affected Products : ideapush- Published: Dec. 03, 2024
- Modified: Jun. 05, 2025
-
4.3
MEDIUMCVE-2023-36518
Missing Authorization vulnerability in Hugh Lashbrooke Post Hit Counter allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post Hit Counter: from n/a through 1.3.2.... Read more
Affected Products :- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024