Latest CVE Feed
-
7.5
HIGHCVE-2021-4339
The uListing plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in the "ulisting/includes/route.php" file on the /1/api/ulisting-user/search REST-API route in versions up to, and including, 1.6.6. This makes it po... Read more
Affected Products : ulisting- Published: Jun. 07, 2023
- Modified: Nov. 21, 2024
-
6.4
MEDIUMCVE-2021-4338
The 404 to 301 plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the open_redirect & save_redirect functions in versions up to, and including, 3.0.7. This makes it possible for authenticated attackers to view, ... Read more
Affected Products : 404_to_301- Published: Jun. 07, 2023
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-4337
Sixteen XforWooCommerce Add-On Plugins for WordPress are vulnerable to authorization bypass due to a missing capability check on the wp_ajax_svx_ajax_factory function in various versions listed below. This makes it possible for authenticated attackers, wi... Read more
Affected Products : add_product_tabs autopilot_seo bulk_add_to_cart comment_and_review_spam_control floating_cart improved_product_options improved_sale_badges live_product_editor live_search package_quantity +6 more products- Published: Jun. 07, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-4336
A vulnerability was found in ITRS Group monitor-ninja up to 2021.11.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file modules/reports/models/scheduled_reports.php. The manipulation leads to sql injection. U... Read more
Affected Products : ninja- Published: May. 28, 2023
- Modified: Nov. 21, 2024
-
6.3
MEDIUMCVE-2021-4335
The Fancy Product Designer plugin for WordPress is vulnerable to unauthorized access to data and modification of plugin settings due to a missing capability check on multiple AJAX functions in versions up to, and including, 4.6.9. This makes it possible f... Read more
Affected Products : fancy_product_designer- Published: Oct. 20, 2023
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-4334
The Fancy Product Designer plugin for WordPress is vulnerable to unauthorized modification of site options due to a missing capability check on the fpd_update_options function in versions up to, and including, 4.6.9. This makes it possible for authenticat... Read more
Affected Products : fancy_product_designer- Published: Oct. 20, 2023
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-4333
The WP Statistics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 13.1.1. This is due to missing or incorrect nonce validation on the view() function. This makes it possible for unauthenticated attackers ... Read more
Affected Products : wp_statistics- Published: Mar. 07, 2023
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-4332
The Plus Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin has a feature to add an "Info Box" to an Elementor created page. This Info Box can include a... Read more
Affected Products : the_plus_addons_for_elementor- Published: Mar. 07, 2023
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-4331
The Plus Addons for Elementor plugin for WordPress is vulnerable to privilege escalation in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin adds a registration form to the Elementor page builders functionality. As part of the regist... Read more
Affected Products : the_plus_addons_for_elementor- Published: Mar. 07, 2023
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-4330
The Envato Elements & Download and Template Kit – Import plugins for WordPress are vulnerable to arbitrary file uploads due to insufficient validation of file type upon extracting uploaded Zip files in the installFreeTemplateKit and uploadTemplateKitZipFi... Read more
- Published: Mar. 07, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-4329
A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address... Read more
Affected Products : json-logic-js- Published: Mar. 05, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-4328
A vulnerability has been found in 狮子鱼CMS and classified as critical. Affected by this vulnerability is the function goods_detail of the file ApiController.class.php. The manipulation of the argument goods_id leads to sql injection. The attack can be launc... Read more
Affected Products : lionfish_cms- Published: Mar. 02, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-4327
A vulnerability was found in SerenityOS. It has been rated as critical. Affected by this issue is the function initialize_typed_array_from_array_buffer in the library Userland/Libraries/LibJS/Runtime/TypedArray.cpp. The manipulation leads to integer overf... Read more
Affected Products : serenityos- Published: Mar. 01, 2023
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-4326
A vulnerability in Imperative framework which allows already-privileged local actors to execute arbitrary shell commands via plugin install/update commands, or maliciously formed environment variables. Impacts Zowe CLI.... Read more
- Published: Mar. 01, 2023
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-4325
A vulnerability, which was classified as problematic, has been found in NHN TOAST UI Chart 4.1.4. This issue affects some unknown processing of the component Legend Handler. The manipulation leads to cross site scripting. The attack may be initiated remot... Read more
Affected Products : toast_ui_chart- Published: Feb. 22, 2023
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-4324
Insufficient policy enforcement in Google Update in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to read arbitrary files via a malicious file. (Chromium security severity: Medium)... Read more
Affected Products : chrome- Published: Jul. 29, 2023
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-4323
Insufficient validation of untrusted input in Extensions in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to access local files via a crafted Chrome Extension. (Chromium security severity: Me... Read more
Affected Products : chrome- Published: Jul. 29, 2023
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-4322
Use after free in DevTools in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)... Read more
Affected Products : chrome- Published: Jul. 29, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-4321
Policy bypass in Blink in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)... Read more
Affected Products : chrome- Published: Jul. 29, 2023
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-4320
Use after free in Blink in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)... Read more
Affected Products : chrome- Published: Jul. 29, 2023
- Modified: Nov. 21, 2024