Latest CVE Feed
-
5.4
MEDIUMCVE-2024-9867
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Open Map Widget' marker_content parameter in all versions up to, and inc... Read more
Affected Products : element_pack- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
7.3
HIGHCVE-2024-10263
The Tickera – WordPress Event Ticketing plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.5.4.4. This is due to the software allowing users to execute an action that does not properly validate a va... Read more
Affected Products : tickera- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
4.3
MEDIUMCVE-2024-10329
The Ultimate Bootstrap Elements for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.6 via the 'ube_get_page_templates' function. This makes it possible for authenticated attackers, w... Read more
Affected Products : ultimate_bootstrap_elements_for_elementor- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
10.0
CRITICALCVE-2024-50495
Unrestricted Upload of File with Dangerous Type vulnerability in WidgiLabs Plugin Propagator allows Upload a Web Shell to a Web Server.This issue affects Plugin Propagator: from n/a through 0.1.... Read more
Affected Products : plugin_propagator- Published: Oct. 28, 2024
- Modified: Nov. 08, 2024
-
6.4
MEDIUMCVE-2024-43937
Missing Authorization vulnerability in Themeum WP Crowdfunding allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Crowdfunding: from n/a through 2.1.10.... Read more
Affected Products : wp_crowdfunding- Published: Nov. 01, 2024
- Modified: Nov. 08, 2024
-
7.5
HIGHCVE-2024-51739
Combodo iTop is a simple, web based IT Service Management tool. Unauthenticated user can perform users enumeration, which can make it easier to bruteforce a valid account. As a fix the sentence displayed after resetting password no longer shows if the use... Read more
Affected Products : itop- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
4.1
MEDIUMCVE-2024-0134
NVIDIA Container Toolkit and NVIDIA GPU Operator for Linux contain a UNIX vulnerability where a specially crafted container image can lead to the creation of unauthorized files on the host. The name and location of the files cannot be controlled by an att... Read more
- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
10.0
CRITICALCVE-2024-50496
Unrestricted Upload of File with Dangerous Type vulnerability in Web and Print Design AR For WordPress allows Upload a Web Shell to a Web Server.This issue affects AR For WordPress: from n/a through 6.2.... Read more
Affected Products : ar- Published: Oct. 28, 2024
- Modified: Nov. 08, 2024
-
4.3
MEDIUMCVE-2024-30106
HCL Connections is vulnerable to an information disclosure vulnerability, due to an IBM WebSphere Application Server error, which could allow a user to obtain sensitive information they are not entitled to due to the improper handling of request data.... Read more
Affected Products : connections- Published: Oct. 28, 2024
- Modified: Nov. 08, 2024
-
6.1
MEDIUMCVE-2024-47826
eLabFTW is an open source electronic lab notebook for research labs. A vulnerability in versions prior to 5.1.5 allows an attacker to inject arbitrary HTML tags in the pages: "experiments.php" (show mode), "database.php" (show mode) or "search.php". It wo... Read more
Affected Products : elabftw- Published: Oct. 14, 2024
- Modified: Nov. 08, 2024
-
7.5
HIGHCVE-2024-47831
Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could ... Read more
Affected Products : next.js- Published: Oct. 14, 2024
- Modified: Nov. 08, 2024
-
6.1
MEDIUMCVE-2024-25566
An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks... Read more
Affected Products : access_management- Published: Oct. 29, 2024
- Modified: Nov. 08, 2024
-
8.6
HIGHCVE-2024-38190
Missing authorization in Power Platform allows an unauthenticated attacker to view sensitive information through a network attack vector.... Read more
Affected Products : power_platform- Published: Oct. 15, 2024
- Modified: Nov. 08, 2024
-
7.5
HIGHCVE-2024-38204
Improper Access Control in Imagine Cup allows an authorized attacker to elevate privileges over a network.... Read more
Affected Products : azure_functions- Published: Oct. 15, 2024
- Modified: Nov. 08, 2024
-
7.8
HIGHCVE-2024-0129
NVIDIA NeMo contains a vulnerability in SaveRestoreConnector where a user may cause a path traversal issue via an unsafe .tar file extraction. A successful exploit of this vulnerability may lead to code execution and data tampering.... Read more
- Published: Oct. 15, 2024
- Modified: Nov. 08, 2024
-
6.1
MEDIUMCVE-2024-9667
The Seriously Simple Podcasting plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.5.0. This makes it possible for unauthenti... Read more
Affected Products : seriously_simple_podcasting- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
9.8
CRITICALCVE-2024-10687
The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons plugin for WordPress is vulnerable to time-based SQL Injection via the $collectedIds parameter in all versions up to, a... Read more
Affected Products : contest_gallery- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
4.3
MEDIUMCVE-2024-7429
The Zotpress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the Zotpress_process_accounts_AJAX function in all versions up to, and including, 7.3.12. This makes it possible for authenticated at... Read more
Affected Products : zotpress- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
4.8
MEDIUMCVE-2024-9878
The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.8.30 due to insufficient input sanitization and output escaping. This m... Read more
Affected Products : photo_gallery- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024
-
4.3
MEDIUMCVE-2024-10319
The 140+ Widgets | Xpro Addons For Elementor – FREE plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.6 via the render function in widgets/content-toggle/layout/frontend.php. This makes it possi... Read more
Affected Products : xpro_addons_for_elementor- Published: Nov. 05, 2024
- Modified: Nov. 08, 2024