Latest CVE Feed
-
9.6
CRITICALCVE-2023-29120
Waybox Enel X web management application could be used to execute arbitrary OS commands and provide administrator’s privileges over the Waybox system.... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
9.6
CRITICALCVE-2023-29119
Waybox Enel X web management application could execute arbitrary requests on the internal database via /admin/dbstore.php.... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
9.6
CRITICALCVE-2023-29118
Waybox Enel X web management application could execute arbitrary requests on the internal database via /admin/versions.php.... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
8.8
HIGHCVE-2023-29117
Waybox Enel X web management API authentication could be bypassed and provide administrator’s privileges over the Waybox system.... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
4.3
MEDIUMCVE-2023-29116
Under certain conditions, through a request directed to the Waybox Enel X web management application, information like Waybox OS version or service configuration details could be obtained.... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
6.5
MEDIUMCVE-2023-29115
In certain conditions a request directed to the Waybox Enel X Web management application could cause a denial-of-service (e.g. reboot).... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
6.4
MEDIUMCVE-2024-9178
The XT Floating Cart for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping. This makes it possible for ... Read more
Affected Products : xt_floating_cart_for_woocommerce- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
6.5
MEDIUMCVE-2024-9657
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘tooltip' parameter in all versions up to, and including, 5.10.2 due to i... Read more
Affected Products : element_pack- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
5.4
MEDIUMCVE-2024-9867
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Open Map Widget' marker_content parameter in all versions up to, and inc... Read more
Affected Products : element_pack- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
7.3
HIGHCVE-2024-10263
The Tickera – WordPress Event Ticketing plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.5.4.4. This is due to the software allowing users to execute an action that does not properly validate a va... Read more
Affected Products : tickera- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
4.3
MEDIUMCVE-2024-10329
The Ultimate Bootstrap Elements for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.6 via the 'ube_get_page_templates' function. This makes it possible for authenticated attackers, w... Read more
Affected Products : ultimate_bootstrap_elements_for_elementor- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
10.0
CRITICALCVE-2024-50495
Unrestricted Upload of File with Dangerous Type vulnerability in WidgiLabs Plugin Propagator allows Upload a Web Shell to a Web Server.This issue affects Plugin Propagator: from n/a through 0.1.... Read more
Affected Products : plugin_propagator- Published: Oct. 28, 2024
- Modified: Nov. 08, 2024
-
6.4
MEDIUMCVE-2024-43937
Missing Authorization vulnerability in Themeum WP Crowdfunding allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Crowdfunding: from n/a through 2.1.10.... Read more
Affected Products : wp_crowdfunding- Published: Nov. 01, 2024
- Modified: Nov. 08, 2024
-
7.5
HIGHCVE-2024-51739
Combodo iTop is a simple, web based IT Service Management tool. Unauthenticated user can perform users enumeration, which can make it easier to bruteforce a valid account. As a fix the sentence displayed after resetting password no longer shows if the use... Read more
Affected Products : itop- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
4.1
MEDIUMCVE-2024-0134
NVIDIA Container Toolkit and NVIDIA GPU Operator for Linux contain a UNIX vulnerability where a specially crafted container image can lead to the creation of unauthorized files on the host. The name and location of the files cannot be controlled by an att... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
10.0
CRITICALCVE-2024-50496
Unrestricted Upload of File with Dangerous Type vulnerability in Web and Print Design AR For WordPress allows Upload a Web Shell to a Web Server.This issue affects AR For WordPress: from n/a through 6.2.... Read more
Affected Products : ar- Published: Oct. 28, 2024
- Modified: Nov. 08, 2024
-
4.3
MEDIUMCVE-2024-30106
HCL Connections is vulnerable to an information disclosure vulnerability, due to an IBM WebSphere Application Server error, which could allow a user to obtain sensitive information they are not entitled to due to the improper handling of request data.... Read more
Affected Products : connections- Published: Oct. 28, 2024
- Modified: Nov. 08, 2024
-
6.1
MEDIUMCVE-2024-47826
eLabFTW is an open source electronic lab notebook for research labs. A vulnerability in versions prior to 5.1.5 allows an attacker to inject arbitrary HTML tags in the pages: "experiments.php" (show mode), "database.php" (show mode) or "search.php". It wo... Read more
Affected Products : elabftw- Published: Oct. 14, 2024
- Modified: Nov. 08, 2024
-
7.5
HIGHCVE-2024-47831
Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could ... Read more
Affected Products : next.js- Published: Oct. 14, 2024
- Modified: Nov. 08, 2024
-
6.1
MEDIUMCVE-2024-25566
An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks... Read more
Affected Products : access_management- Published: Oct. 29, 2024
- Modified: Nov. 08, 2024