Latest CVE Feed
-
6.5
MEDIUMCVE-2024-53802
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FuturioWP Futurio Extra allows Stored XSS.This issue affects Futurio Extra: from n/a through 2.0.14.... Read more
Affected Products : futurio_extra- Published: Dec. 06, 2024
- Modified: Feb. 03, 2025
-
6.5
MEDIUMCVE-2024-53801
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldThemes Bold Page Builder allows Stored XSS.This issue affects Bold Page Builder: from n/a through 5.2.1.... Read more
Affected Products : bold_page_builder- Published: Dec. 06, 2024
- Modified: Jan. 08, 2025
-
4.3
MEDIUMCVE-2024-53799
Missing Authorization vulnerability in BAKKBONE Australia FloristPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FloristPress: from n/a through 7.3.0.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
6.5
MEDIUMCVE-2024-53797
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The Beaver Builder Team Beaver Builder allows Stored XSS.This issue affects Beaver Builder: from n/a through 2.8.4.3.... Read more
Affected Products : beaver_builder- Published: Dec. 06, 2024
- Modified: Jan. 31, 2025
-
6.5
MEDIUMCVE-2024-53796
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themesflat Themesflat Addons For Elementor allows DOM-Based XSS.This issue affects Themesflat Addons For Elementor: from n/a through 2.2.2.... Read more
Affected Products : themesflat_addons_for_elementor- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
5.3
MEDIUMCVE-2024-53795
Missing Authorization vulnerability in Andy Moyle Church Admin allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Church Admin: from n/a through 5.0.8.... Read more
Affected Products : church_admin- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
6.5
MEDIUMCVE-2024-53794
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LOOS,Inc. Arkhe Blocks allows Stored XSS.This issue affects Arkhe Blocks: from n/a through 2.27.0.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
9.8
CRITICALCVE-2024-52335
A vulnerability has been identified in syngo.plaza VB30E (All versions < VB30E_HF05). The affected application do not properly sanitize input data before sending it to the SQL server. This could allow an attacker with access to the application could use t... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
9.0
CRITICALCVE-2024-51815
Improper Control of Generation of Code ('Code Injection') vulnerability in WP Sharks s2Member Pro allows Code Injection.This issue affects s2Member Pro: from n/a through 241114.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
9.3
CRITICALCVE-2024-51615
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Owen Cutajar & Hyder Jaffari WordPress Auction Plugin allows SQL Injection.This issue affects WordPress Auction Plugin: from n/a through 3.7.... Read more
Affected Products : wordpress_auction- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
6.4
MEDIUMCVE-2024-4633
The Slider and Carousel slider by Depicter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘addExtraMimeType’ function in versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping. This makes... Read more
Affected Products : depicter- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.1
HIGHCVE-2024-21571
Snyk has identified a remote code execution (RCE) vulnerability in all versions of Code Agent. The vulnerability enables an attacker to execute arbitrary code within the Code Agent container. Exploiting this vulnerability would require an attacker to have... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
5.4
MEDIUMCVE-2024-11321
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hi e-learning Learning Management System (LMS) allows Reflected XSS.This issue affects Learning Management System (LMS): before 06.12.2024.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.1
HIGHCVE-2024-10516
The Swift Performance Lite plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 2.3.7.1 via the 'ajaxify' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files... Read more
Affected Products : swift_performance- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
5.6
MEDIUMCVE-2024-11022
The authentication process to the web server uses a challenge response procedure which inludes the nonce and additional information. This challenge can be used several times for login and is therefore vulnerable for a replay attack.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.2
HIGHCVE-2024-10776
Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
7.3
HIGHCVE-2024-10774
Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authentication.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
9.0
CRITICALCVE-2024-10773
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain full access to the device.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.8
HIGHCVE-2024-10772
Since the firmware update is not validated, an attacker can install modified firmware on the device. This has a high impact on the availabilty, integrity and confidentiality up to the complete compromise of the device.... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024
-
8.8
HIGHCVE-2024-10771
Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can execute arbitrary system commands in the root user’s cont... Read more
Affected Products :- Published: Dec. 06, 2024
- Modified: Dec. 06, 2024