Latest CVE Feed
-
6.5
MEDIUMCVE-2024-10435
A vulnerability was found in didi Super-Jacoco 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /cov/triggerEnvCov. The manipulation of the argument uuid leads to command injection. The attack can be initiated rem... Read more
Affected Products : super-jacoco- Published: Oct. 28, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9116
The Monkee-Boy Essentials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.2
HIGHCVE-2024-0126
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability which could allow a privileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges,... Read more
Affected Products : virtual_gpu- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26307
HTML2Markdown is a Javascript implementation for converting HTML to Markdown text. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patc... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26309
Validate.js provides a declarative way of validating javascript objects. Versions 0.11.3 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
9.8
CRITICALCVE-2024-9933
The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.6. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login'... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
9.8
CRITICALCVE-2024-9932
The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers ... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
7.2
HIGHCVE-2024-8392
The WordPress Post Grid Layouts with Pagination – Sogrid plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.5.2 via the 'tab' parameter. This makes it possible for authenticated attackers, with Administrator... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
4.3
MEDIUMCVE-2024-10357
The Clever Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.1 via the getTemplateContent function in src/widgets/class-clever-widget-base.php. This makes it possible for au... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
5.3
MEDIUMCVE-2023-26248
The Kademlia DHT (go-libp2p-kad-dht 0.20.0 and earlier) used in IPFS (0.18.1 and earlier) assigns routing information for content (i.e., information about who holds the content) to be stored by peers whose peer IDs have a small DHT distance from the conte... Read more
Affected Products :- Published: Oct. 25, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9454
The PriPre plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 0.4.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, ... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
7.1
HIGHCVE-2024-0128
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager that allows a user of the guest OS to access global resources. A successful exploit of this vulnerability might lead to information disclosure, data tampering, and escalation of priv... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26310
Validate.js provides a declarative way of validating javascript objects. All versions as of 30 November 2020 contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unkn... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26306
Knwl.js is a Javascript library that parses through text for dates, times, phone numbers, emails, places, and more. Versions 1.0.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
5.5
MEDIUMCVE-2024-50307
Use of potentially dangerous function issue exists in Chatwork Desktop Application (Windows) versions prior to 2.9.2. If a user clicks a specially crafted link in the application, an arbitrary file may be downloaded from an external website and executed. ... Read more
Affected Products :- Published: Oct. 28, 2024
- Modified: Oct. 28, 2024
-
9.1
CRITICALCVE-2024-47821
pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is finished. By downloading a executable file to a folder in /scripts and performing the res... Read more
Affected Products : pyload- Published: Oct. 25, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9853
The ID-SK Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attac... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
6.1
MEDIUMCVE-2024-8870
The Forms for Mailchimp by Optin Cat – Grow Your MailChimp List plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.6. This ... Read more
Affected Products : forms_for_mailchimp_by_optin_cat- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26308
Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
4.3
MEDIUMCVE-2024-10092
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_handle_api_key_actions function in all versions up to, and including, 5.0.12. This makes it possible for authenticat... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024