Latest CVE Feed
-
9.0
CRITICALCVE-2024-51815
Improper Control of Generation of Code ('Code Injection') vulnerability in WP Sharks s2Member Pro allows Code Injection.This issue affects s2Member Pro: from n/a through 241114.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
9.3
CRITICALCVE-2024-51615
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Owen Cutajar & Hyder Jaffari WordPress Auction Plugin allows SQL Injection.This issue affects WordPress Auction Plugin: from n/a through 3.7.... Read more
Affected Products : wordpress_auction- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
6.4
MEDIUMCVE-2024-4633
The Slider and Carousel slider by Depicter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘addExtraMimeType’ function in versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping. This makes... Read more
Affected Products : depicter- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.1
HIGHCVE-2024-21571
Snyk has identified a remote code execution (RCE) vulnerability in all versions of Code Agent. The vulnerability enables an attacker to execute arbitrary code within the Code Agent container. Exploiting this vulnerability would require an attacker to have... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
5.4
MEDIUMCVE-2024-11321
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hi e-learning Learning Management System (LMS) allows Reflected XSS.This issue affects Learning Management System (LMS): before 06.12.2024.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.1
HIGHCVE-2024-10516
The Swift Performance Lite plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 2.3.7.1 via the 'ajaxify' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files... Read more
Affected Products : swift_performance- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
5.6
MEDIUMCVE-2024-11022
The authentication process to the web server uses a challenge response procedure which inludes the nonce and additional information. This challenge can be used several times for login and is therefore vulnerable for a replay attack.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.2
HIGHCVE-2024-10776
Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
7.3
HIGHCVE-2024-10774
Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authentication.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
9.0
CRITICALCVE-2024-10773
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain full access to the device.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.8
HIGHCVE-2024-10772
Since the firmware update is not validated, an attacker can install modified firmware on the device. This has a high impact on the availabilty, integrity and confidentiality up to the complete compromise of the device.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.8
HIGHCVE-2024-10771
Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can execute arbitrary system commands in the root user’s cont... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
9.8
CRITICALCVE-2024-53908
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection if untrusted data is used as an lhs ... Read more
Affected Products : django- Published: Dec. 06, 2024
- Modified: Jun. 09, 2025
-
7.5
HIGHCVE-2024-53907
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested... Read more
Affected Products : django- Published: Dec. 06, 2024
- Modified: Jun. 24, 2025
-
6.5
MEDIUMCVE-2024-11730
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'sort[]' parameter of the static_data_list AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user... Read more
Affected Products : kivicare- Published: Dec. 06, 2024
- Modified: Feb. 05, 2025
-
6.5
MEDIUMCVE-2024-11729
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'service_list[0][service_id]' parameter of the get_widget_payment_options AJAX action in all versions up to, and including, 3.6.4 due to in... Read more
Affected Products : kivicare- Published: Dec. 06, 2024
- Modified: Feb. 05, 2025
-
7.8
HIGHCVE-2024-53142
In the Linux kernel, the following vulnerability has been resolved: initramfs: avoid filename buffer overrun The initramfs filename field is defined in Documentation/driver-api/early-userspace/buffer-format.rst as: 37 cpio_file := ALGN(4) + cpio_heade... Read more
Affected Products : linux_kernel- Published: Dec. 06, 2024
- Modified: Dec. 14, 2024
-
7.8
HIGHCVE-2024-53141
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. The... Read more
Affected Products : linux_kernel- Published: Dec. 06, 2024
- Modified: Dec. 14, 2024
-
7.5
HIGHCVE-2024-11728
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'visit_type[service_id]' parameter of the tax_calculated_data AJAX action in all versions up to, and including, 3.6.4 due to insufficient e... Read more
Affected Products : kivicare- Published: Dec. 06, 2024
- Modified: Feb. 05, 2025
-
7.5
HIGHCVE-2024-11460
The Verowa Connect plugin for WordPress is vulnerable to SQL Injection via the 'search_string' parameter in all versions up to, and including, 3.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the exis... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024