Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2025-1361

    The IP2Location Country Blocker plugin for WordPress is vulnerable to Regular Information Exposure in all versions up to, and including, 2.38.8 due to missing capability checks on the admin_init() function. This makes it possible for unauthenticated attac... Read more

    Affected Products : country_blocker
    • Published: Feb. 22, 2025
    • Modified: Feb. 22, 2025
    • Vuln Type: Information Disclosure
  • 6.4

    MEDIUM
    CVE-2024-13564

    The Rife Elementor Extensions & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Writing Effect Headline shortcode in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output es... Read more

    • Published: Feb. 22, 2025
    • Modified: Mar. 18, 2025
    • Vuln Type: Cross-Site Scripting
  • 5.3

    MEDIUM
    CVE-2024-13798

    The Post Grid and Gutenberg Blocks – ComboBlocks plugin for WordPress is vulnerable to unauthorized order creation in all versions up to, and including, 2.3.5. This is due to insufficient verification on form fields. This makes it possible for unauthentic... Read more

    Affected Products : comboblocks
    • Published: Feb. 22, 2025
    • Modified: Feb. 22, 2025
    • Vuln Type: Authentication
  • 7.5

    HIGH
    CVE-2024-13474

    The LTL Freight Quotes – Purolator Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 2.2.3 due to insufficient escaping on the user supplied parameter and ... Read more

    Affected Products :
    • Published: Feb. 22, 2025
    • Modified: Feb. 22, 2025
    • Vuln Type: Injection
  • 6.1

    MEDIUM
    CVE-2024-12467

    The Pago por Redsys plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'Ds_MerchantParameters' parameter in all versions up to, and including, 1.0.12 due to insufficient input sanitization and output escaping. This makes it possi... Read more

    Affected Products : payment_by_redsys payment_by_redsys
    • Published: Feb. 22, 2025
    • Modified: Feb. 22, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.4

    MEDIUM
    CVE-2024-12038

    The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'buddyforms_nav' shortcode in all versions up to, and... Read more

    Affected Products : buddyforms
    • Published: Feb. 22, 2025
    • Modified: Feb. 22, 2025
    • Vuln Type: Cross-Site Scripting
  • 9.8

    CRITICAL
    CVE-2025-1510

    The The Custom Post Type Date Archives plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.7.1. This is due to the software allowing users to execute an action that does not properly validate a value... Read more

    Affected Products : custom_post_type_date_archives
    • Published: Feb. 22, 2025
    • Modified: Feb. 22, 2025
    • Vuln Type: Authentication
  • 9.8

    CRITICAL
    CVE-2025-1509

    The The Show Me The Cookies plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0. This is due to the software allowing users to execute an action that does not properly validate a value before runni... Read more

    Affected Products : show_me_the_cookies
    • Published: Feb. 22, 2025
    • Modified: Feb. 22, 2025
    • Vuln Type: Authentication
  • 7.2

    HIGH
    CVE-2024-13899

    The Mambo Importer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0 via deserialization of untrusted input via the $data parameter in the fImportMenu function. This makes it possible for authenticated at... Read more

    Affected Products : mambo_joomla_importer
    • Published: Feb. 22, 2025
    • Modified: Mar. 11, 2025
    • Vuln Type: Authentication
  • 4.3

    MEDIUM
    CVE-2024-13873

    The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.8 via the deleteUserPhoto() function due to missing validat... Read more

    Affected Products : wp_job_portal
    • Published: Feb. 22, 2025
    • Modified: Mar. 11, 2025
    • Vuln Type: Authorization
  • 5.3

    MEDIUM
    CVE-2024-22341

    IBM Watson Query on Cloud Pak for Data 4.0.0 through 4.0.9, 4.5.0 through 4.5.3, 4.6.0 through 4.6.6, 4.7.0 through 4.7.4, and 4.8.0 through 4.8.7 could allow unauthorized data access from a remote data source object due to improper privilege management.... Read more

    • Published: Feb. 22, 2025
    • Modified: Feb. 22, 2025
    • Vuln Type: Authorization
  • 3.3

    LOW
    CVE-2024-45674

    IBM Security Verify Bridge Directory Sync 1.0.1 through 1.0.12, IBM Security Verify Gateway for Windows Login 1.0.1 through 1.0.10, and IBM Security Verify Gateway for Radius 1.0.1 through 1.0.11 stores potentially sensitive information in log files tha... Read more

    • Published: Feb. 22, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Information Disclosure
  • 7.3

    HIGH
    CVE-2025-27109

    solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put dire... Read more

    Affected Products :
    • Published: Feb. 21, 2025
    • Modified: Feb. 24, 2025
    • Vuln Type: Cross-Site Scripting
  • 7.3

    HIGH
    CVE-2025-27108

    dom-expressions is a Fine-Grained Runtime for Performant DOM Rendering. In affected versions the use of javascript's `.replace()` opens up to potential Cross-site Scripting (XSS) vulnerabilities with the special replacement patterns beginning with `$`. Pa... Read more

    Affected Products : dom_expressions
    • Published: Feb. 21, 2025
    • Modified: Feb. 27, 2025
    • Vuln Type: Cross-Site Scripting
  • 8.8

    HIGH
    CVE-2025-27106

    binance-trading-bot is an automated Binance trading bot with trailing buy/sell strategy. Authenticated users of binance-trading-bot can achieve Remote Code Execution on the host system due to a command injection vulnerability in the `/restore` endpoint. T... Read more

    Affected Products :
    • Published: Feb. 21, 2025
    • Modified: Feb. 22, 2025
    • Vuln Type: Injection
  • 9.1

    CRITICAL
    CVE-2025-27105

    vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statements by first caching the target location to avoid double evaluation. However, in the case when target is an access to a DynArray and the rhs modifies the array, the ca... Read more

    Affected Products : vyper
    • Published: Feb. 21, 2025
    • Modified: Mar. 28, 2025
    • Vuln Type: Memory Corruption
  • 7.5

    HIGH
    CVE-2025-27104

    vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single expression is possible in the iterator target of a for loop. While the iterator expression cannot produce multiple writes, it can consume side effects produced in the... Read more

    Affected Products : vyper
    • Published: Feb. 21, 2025
    • Modified: Mar. 28, 2025
    • Vuln Type: Misconfiguration
  • 7.5

    HIGH
    CVE-2025-26622

    vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the babylonian method to calculate square roots of decimals. Unfortunately, improper handling of the oscillating final states may lead to sqrt incorrectly returning round... Read more

    Affected Products : vyper
    • Published: Feb. 21, 2025
    • Modified: Mar. 28, 2025
  • 6.8

    MEDIUM
    CVE-2019-8900

    A vulnerability in the SecureROM of some Apple devices can be exploited by an unauthenticated local attacker to execute arbitrary code upon booting those devices. This vulnerability allows arbitrary code to be executed on the device. Exploiting the vulner... Read more

    Affected Products : securerom a10_fusion a10x_fusion a11_bionic a5 a5x a6 a6x a7 a8 +3 more products
    • Published: Feb. 21, 2025
    • Modified: Jul. 29, 2025
    • Vuln Type: Memory Corruption
  • 8.1

    HIGH
    CVE-2025-25282

    RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list... Read more

    Affected Products : ragflow
    • Published: Feb. 21, 2025
    • Modified: Jul. 16, 2025
    • Vuln Type: Authorization
Showing 20 of 291712 Results