Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.6

    HIGH
    CVE-2024-11838

    External Control of File Name or Path vulnerability in PlexTrac allows Local Code Inclusion through use of an undocumented API endpoint.This issue affects PlexTrac: from 1.61.3 before 2.8.1.... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 8.6

    HIGH
    CVE-2024-11837

    Improper Neutralization of Special Elements used in an N1QL Command ('N1QL Injection') vulnerability in PlexTrac  allows N1QL Injection.This issue affects PlexTrac: from 1.61.3 before 2.8.1.... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 8.6

    HIGH
    CVE-2024-11836

    Server-Side Request Forgery (SSRF) vulnerability in PlexTrac allowing requests to internal system resources.This issue affects PlexTrac: from 1.61.3 before 2.8.1.... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 7.0

    HIGH
    CVE-2024-11835

    Uncontrolled Resource Consumption vulnerability in PlexTrac allows WebSocket DoS.This issue affects PlexTrac: from 1.61.3 before 2.8.1.... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 9.1

    CRITICAL
    CVE-2024-11834

    Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PlexTrac allows arbitrary file writes.This issue affects PlexTrac: from 1.61.3 before 2.8.1.... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 16, 2024
  • 8.9

    HIGH
    CVE-2024-11833

    Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PlexTrac allows arbitrary file writes.This issue affects PlexTrac: from 1.61.3 before 2.8.1.... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 4.8

    MEDIUM
    CVE-2024-10939

    The Image Widget WordPress plugin before 4.4.11 does not sanitise and escape some of its Image Widget settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is... Read more

    Affected Products : image_widget
    • Published: Dec. 13, 2024
    • Modified: May. 14, 2025
  • 5.4

    MEDIUM
    CVE-2024-10678

    The Ultimate Blocks WordPress plugin before 3.2.4 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cr... Read more

    Affected Products : ultimate_blocks
    • Published: Dec. 13, 2024
    • Modified: May. 08, 2025
  • 8.6

    HIGH
    CVE-2024-21544

    Versions of the package spatie/browsershot before 5.0.1 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method. An attacker can exploit this vulnerability by using leading whitespace (%20) before the file:// p... Read more

    Affected Products : browsershot
    • Published: Dec. 13, 2024
    • Modified: Feb. 04, 2025
  • 7.1

    HIGH
    CVE-2024-21543

    Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and event... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Feb. 20, 2025
  • 5.3

    MEDIUM
    CVE-2024-12579

    The Minify HTML plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 2.1.10. This is due to processing user-supplied input as a regular expression. This makes it possible for unauthentic... Read more

    Affected Products : minify_html
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 5.4

    MEDIUM
    CVE-2024-12574

    The SVG Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated att... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 6.1

    MEDIUM
    CVE-2024-11809

    The Primer MyData for Woocommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'img_src' parameter in all versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping. This makes it possib... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 6.4

    MEDIUM
    CVE-2024-11767

    The NewsmanApp plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'newsman_subscribe_widget' shortcode in all versions up to, and including, 2.7.6 due to insufficient input sanitization and output escaping on user supplied ... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 6.1

    MEDIUM
    CVE-2024-12572

    The Hello In All Languages plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.6. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attacke... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 3.7

    LOW
    CVE-2024-12300

    The AR for WordPress plugin for WordPress is vulnerable to unauthorized double extension file upload due to a missing capability check on the set_ar_featured_image() function in all versions up to, and including, 7.3. This makes it possible for unauthenti... Read more

    Affected Products : ar
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 6.5

    MEDIUM
    CVE-2019-25221

    The Responsive Filterable Portfolio plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on th... Read more

    Affected Products : responsive_filterable_portfolio
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 9.8

    CRITICAL
    CVE-2024-12603

    A logic vulnerability in the the mobile application (com.transsion.applock) can lead to bypassing the application password.... Read more

    Affected Products :
    • Published: Dec. 13, 2024
    • Modified: Sep. 05, 2025
  • 8.5

    HIGH
    CVE-2024-9508

    Horner Automation Cscape contains a memory corruption vulnerability, which could allow an attacker to disclose information and execute arbitrary code.... Read more

    Affected Products : cscape
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
  • 8.5

    HIGH
    CVE-2024-12212

    The vulnerability occurs in the parsing of CSP files. The issues result from the lack of proper validation of user-supplied data, which could allow reading past the end of allocated data structures, resulting in execution of arbitrary code.... Read more

    Affected Products : cscape
    • Published: Dec. 13, 2024
    • Modified: Dec. 13, 2024
Showing 20 of 292721 Results