Latest CVE Feed
-
8.7
HIGHCVE-2020-26310
Validate.js provides a declarative way of validating javascript objects. All versions as of 30 November 2020 contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unkn... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26308
Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
5.5
MEDIUMCVE-2024-50307
Use of potentially dangerous function issue exists in Chatwork Desktop Application (Windows) versions prior to 2.9.2. If a user clicks a specially crafted link in the application, an arbitrary file may be downloaded from an external website and executed. ... Read more
Affected Products :- Published: Oct. 28, 2024
- Modified: Oct. 28, 2024
-
5.3
MEDIUMCVE-2023-26248
The Kademlia DHT (go-libp2p-kad-dht 0.20.0 and earlier) used in IPFS (0.18.1 and earlier) assigns routing information for content (i.e., information about who holds the content) to be stored by peers whose peer IDs have a small DHT distance from the conte... Read more
Affected Products :- Published: Oct. 25, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9454
The PriPre plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 0.4.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, ... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
4.3
MEDIUMCVE-2024-10357
The Clever Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.1 via the getTemplateContent function in src/widgets/class-clever-widget-base.php. This makes it possible for au... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.8
HIGHCVE-2024-9890
The User Toolkit plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2.3. This is due to an improper capability check in the 'switchUser' function. This makes it possible for authenticated attackers, with subscr... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
9.8
CRITICALCVE-2024-9930
The Extensions by HocWP Team plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.2.3.2. This is due to missing validation on the user being supplied in the 'verify_email' action. This makes it possible for unaut... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
9.8
CRITICALCVE-2024-48204
SQL injection vulnerability in Hanzhou Haobo network management system 1.0 allows a remote attacker to execute arbitrary code via a crafted script.... Read more
Affected Products :- Published: Oct. 25, 2024
- Modified: Oct. 28, 2024
-
6.1
MEDIUMCVE-2024-49378
smartUp, a web browser mouse gestures extension, has a universal cross-site scripting issue in the Edge and Firefox versions of smartUp 7.2.622.1170. The vulnerability allows another extension to execute arbitrary code in the context of the user’s tab. As... Read more
Affected Products :- Published: Oct. 25, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26307
HTML2Markdown is a Javascript implementation for converting HTML to Markdown text. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patc... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.2
HIGHCVE-2024-0126
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability which could allow a privileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges,... Read more
Affected Products : virtual_gpu- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9116
The Monkee-Boy Essentials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
2.2
LOWCVE-2024-23843
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Genians Genian NAC V5.0, Genians Genian NAC LTS V5.0.This issue affects Genian NAC V5.0: from V5.0.0 through V5.0.60; Genian NAC LTS V5.0: from 5.0.0 LTS... Read more
Affected Products :- Published: Oct. 28, 2024
- Modified: Oct. 28, 2024
-
6.5
MEDIUMCVE-2024-10435
A vulnerability was found in didi Super-Jacoco 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /cov/triggerEnvCov. The manipulation of the argument uuid leads to command injection. The attack can be initiated rem... Read more
Affected Products : super-jacoco- Published: Oct. 28, 2024
- Modified: Oct. 28, 2024
-
7.8
HIGHCVE-2024-0127
NVIDIA vGPU software contains a vulnerability in the GPU kernel driver of the vGPU Manager for all supported hypervisors, where a user of the guest OS can cause an improper input validation by compromising the guest OS kernel. A successful exploit of this... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9642
The Editor Custom Color Palette plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.3.7 due to insufficient input sanitization and output escaping. This makes it possible for authe... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
6.1
MEDIUMCVE-2024-48654
Cross Site Scripting vulnerability in Blood Bank v.1 allows a remote attacker to execute arbitrary code via a crafted script to the login.php component.... Read more
Affected Products :- Published: Oct. 25, 2024
- Modified: Oct. 28, 2024
-
9.8
CRITICALCVE-2024-9501
The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.0.7. This is due to insufficient verification on the user being returned by the social login token. This ma... Read more
Affected Products : wp_social_login_and_register_social_counter- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9456
The WP Awesome Login plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 0.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated at... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024