Latest CVE Feed
-
3.9
LOWCVE-2025-1693
The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to ... Read more
Affected Products : mongosh- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Injection
-
6.3
MEDIUMCVE-2025-1692
The MongoDB Shell may be susceptible to control character injection where an attacker with control of the user’s clipboard could manipulate them to paste text into mongosh that evaluates arbitrary code. Control characters in the pasted text can be used to... Read more
Affected Products : mongosh- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Injection
-
7.6
HIGHCVE-2025-1691
The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the fo... Read more
Affected Products : mongosh- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Injection
-
6.4
MEDIUMCVE-2024-13402
The Buddyboss Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link_title’ parameter in all versions up to, and including, 2.7.70 due to insufficient input sanitization and output escaping. This makes it possible for aut... Read more
Affected Products : buddyboss_platform- Published: Feb. 27, 2025
- Modified: May. 24, 2025
- Vuln Type: Cross-Site Scripting
-
9.8
CRITICALCVE-2025-1751
A SQL Injection vulnerability has been found in Ciges 2.15.5 from ATISoluciones. This vulnerability allows an attacker to retrieve, create, update and delete database via $idServicio parameter in /modules/ajaxBloqueaCita.php endpoint.... Read more
Affected Products :- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Injection
-
4.3
MEDIUMCVE-2024-13217
The Jeg Elementor Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.11 via the 'expired_data' and 'build_content' functions. This makes it possible for authenticated attackers, with Contribu... Read more
Affected Products : jeg_elementor_kit- Published: Feb. 27, 2025
- Modified: Mar. 25, 2025
- Vuln Type: Information Disclosure
-
9.8
CRITICALCVE-2024-10918
Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length.... Read more
Affected Products : libmodbus- Published: Feb. 27, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Memory Corruption
-
6.4
MEDIUMCVE-2025-1450
The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button, WhatsApp – Chaty plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-hover’ parameter in all versions up to, and incl... Read more
Affected Products : floating_chat_widget- Published: Feb. 27, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2024-13734
The Card Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Profile Card widget in all versions up to, and including, 1.2.6 due to insufficient input sanitization and output escaping on user supplied ... Read more
Affected Products : card_elements_for_elementor- Published: Feb. 27, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2025-1690
The ThemeMakers Stripe Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'stripe' shortcode in versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. Th... Read more
Affected Products : stripe_checkout- Published: Feb. 27, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Cross-Site Scripting
-
8.8
HIGHCVE-2025-1282
The Car Dealer Automotive WordPress Theme – Responsive theme for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_post_photo() and add_car() functions in all versions up to, and including, 1.6.3. Th... Read more
Affected Products : car_dealer_automotive- Published: Feb. 27, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Path Traversal
-
8.1
HIGHCVE-2025-1717
The Login Me Now plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.2. This is due to insecure authentication based on an arbitrary transient name in the 'AutoLogin::listen()' function. This makes it possible... Read more
Affected Products : login_me_now- Published: Feb. 27, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Authentication
-
6.1
MEDIUMCVE-2024-5848
A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, ... Read more
Affected Products :- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2025-1689
The ThemeMakers PayPal Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'paypal' shortcode in versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping on user supplied attrib... Read more
Affected Products : paypal_checkout- Published: Feb. 27, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2024-13907
The Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.16.8 via the 'download' function. This makes it possible for authentica... Read more
Affected Products : total_upkeep- Published: Feb. 27, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Server-Side Request Forgery
-
5.4
MEDIUMCVE-2024-0392
A Cross-Site Request Forgery (CSRF) vulnerability exists in the management console of WSO2 Enterprise Integrator 6.6.0 due to the absence of CSRF token validation. This flaw allows attackers to craft malicious requests that can trigger state-changing oper... Read more
Affected Products :- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
8.8
HIGHCVE-2025-1295
The Templines Elementor Helper Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.7. This is due to allowing arbitrary user meta updates. This makes it possible for authenticated attackers, with Subscri... Read more
Affected Products :- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Authorization
-
6.4
MEDIUMCVE-2024-6261
The Image Photo Gallery Final Tiles Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'FinalTilesGallery' shortcode in all versions up to, and including, 3.6.0 due to insufficient input sanitization and output escapin... Read more
Affected Products : image_photo_gallery_final_tiles_grid- Published: Feb. 27, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Cross-Site Scripting
-
8.8
HIGHCVE-2024-2297
The Bricks theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.6.1. This is due to insufficient validation checks placed on the create_autosave AJAX function. This makes it possible for authenticated attacke... Read more
Affected Products : bricks- Published: Feb. 27, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Authorization
-
6.8
MEDIUMCVE-2025-1686
All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this ... Read more
Affected Products : pebble- Published: Feb. 27, 2025
- Modified: Apr. 07, 2025
- Vuln Type: Path Traversal