Latest CVE Feed
-
9.8
CRITICALCVE-2022-41415
Acer Altos W2000h-W570h F4 R01.03.0018 was discovered to contain a stack overflow in the RevserveMem component. This vulnerability allows attackers to cause a Denial of Service (DoS) via injecting crafted shellcode into the NVRAM variable.... Read more
- EPSS Score: %0.34
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
9.8
CRITICALCVE-2021-38217
SEMCMS v 1.2 is vulnerable to SQL Injection via SEMCMS_User.php.... Read more
Affected Products : semcms- EPSS Score: %0.07
- Published: Oct. 28, 2022
- Modified: May. 08, 2025
-
4.7
MEDIUMCVE-2024-2428
The Ultimate Video Player For WordPress WordPress plugin before 2.2.3 does not have proper capability check when updating its settings via a REST route, allowing Contributor and above users to update them. Furthermore, due to the lack of escaping in one ... Read more
Affected Products : presto_player- Published: Apr. 10, 2024
- Modified: May. 08, 2025
-
6.1
MEDIUMCVE-2024-2729
The Otter Blocks WordPress plugin before 2.6.6 does not properly escape its mainHeadings blocks' attribute before appending it to the final rendered block, allowing contributors to conduct Stored XSS attacks.... Read more
Affected Products : otter_blocks- Published: Apr. 18, 2024
- Modified: May. 08, 2025
-
5.9
MEDIUMCVE-2024-2118
The Social Media Share Buttons & Social Sharing Icons WordPress plugin before 2.8.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfilt... Read more
- Published: Apr. 17, 2024
- Modified: May. 08, 2025
-
5.3
MEDIUMCVE-2024-1219
The Easy Social Feed WordPress plugin before 6.5.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting att... Read more
Affected Products : easy_social_feed- Published: Apr. 17, 2024
- Modified: May. 08, 2025
-
4.8
MEDIUMCVE-2024-2858
The Simple Buttons Creator WordPress plugin through 1.04 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks... Read more
Affected Products : simple_buttons_creator- Published: Apr. 15, 2024
- Modified: May. 08, 2025
-
6.1
MEDIUMCVE-2024-2857
The Simple Buttons Creator WordPress plugin through 1.04 does not have any authorisation as well as CSRF in its add button function, allowing unauthenticated users to call them either directly or via CSRF attacks. Furthermore, due to the lack of sanitisat... Read more
Affected Products : simple_buttons_creator- Published: Apr. 15, 2024
- Modified: May. 08, 2025
-
4.8
MEDIUMCVE-2024-2836
The Social Share, Social Login and Social Comments Plugin WordPress plugin before 7.13.64 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfilter... Read more
- Published: Apr. 15, 2024
- Modified: May. 08, 2025
-
8.8
HIGHCVE-2023-47353
An issue in the com.oneed.dvr.service.DownloadFirmwareService component of IMOU GO v1.0.11 allows attackers to force the download of arbitrary files.... Read more
Affected Products : imou_go- EPSS Score: %0.17
- Published: Feb. 06, 2024
- Modified: May. 08, 2025
-
8.8
HIGHCVE-2022-43416
Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit where it can be executed and allows invoking Katalon with configurable arguments, allowing attackers able to control agent processes to invoke Katalon on ... Read more
- EPSS Score: %0.38
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
5.3
MEDIUMCVE-2022-43414
Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specif... Read more
Affected Products : nunit- EPSS Score: %0.15
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
4.3
MEDIUMCVE-2022-43413
Jenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.... Read more
Affected Products : job_import- EPSS Score: %0.13
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
5.3
MEDIUMCVE-2022-43412
Jenkins Generic Webhook Trigger Plugin 1.84.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid web... Read more
Affected Products : generic_webhook_trigger- EPSS Score: %0.16
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
5.3
MEDIUMCVE-2022-43411
Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.... Read more
Affected Products : gitlab- EPSS Score: %0.16
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
5.3
MEDIUMCVE-2022-43410
Jenkins Mercurial Plugin 1251.va_b_121f184902 and earlier provides information about which jobs were triggered or scheduled for polling through its webhook endpoint, including jobs the user has no permission to access.... Read more
Affected Products : mercurial- EPSS Score: %0.11
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
5.4
MEDIUMCVE-2022-43409
Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers ... Read more
Affected Products : pipeline\- EPSS Score: %3.09
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
6.5
MEDIUMCVE-2022-43408
Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting... Read more
Affected Products : pipeline\- EPSS Score: %0.01
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
8.8
HIGHCVE-2022-43407
Jenkins Pipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the 'input' step, which is used for the URLs that process user interactions for the given 'input' step (proceed or abort) and ... Read more
Affected Products : pipeline\- EPSS Score: %0.01
- Published: Oct. 19, 2022
- Modified: May. 08, 2025
-
5.5
MEDIUMCVE-2022-43283
wasm2c v1.0.29 was discovered to contain an abort in CWriter::Write.... Read more
Affected Products : wabt- EPSS Score: %0.03
- Published: Oct. 28, 2022
- Modified: May. 08, 2025