Latest CVE Feed
-
8.8
HIGHCVE-2024-10311
The External Database Based Actions plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.1. This is due to a missing capability check in the 'edba_admin_handle' function. This makes it possible for authenticated ... Read more
Affected Products : external_database_based_actions- Published: Nov. 15, 2024
- Modified: Nov. 19, 2024
-
7.5
HIGHCVE-2024-45784
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive configuration variables in task logs. This vulnerability allows DAG authors to unintentionally or intentionally log sensitive configuration variables. Unauthorized u... Read more
Affected Products : airflow- Published: Nov. 15, 2024
- Modified: Jun. 03, 2025
-
6.6
MEDIUMCVE-2024-9529
The Secure Custom Fields WordPress plugin before 6.3.9, Secure Custom Fields WordPress plugin before 6.3.6.3, Advanced Custom Fields Pro WordPress plugin before 6.3.9 does not prevent users from running arbitrary functions through its setting import funct... Read more
Affected Products : advanced_custom_fields- Published: Nov. 15, 2024
- Modified: Jun. 11, 2025
-
6.4
MEDIUMCVE-2024-8961
The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘nomore_items_text’ parameter in all versions up to, and including, 6.0.7 ... Read more
Affected Products : essential_addons_for_elementor- Published: Nov. 15, 2024
- Modified: Nov. 19, 2024
-
6.1
MEDIUMCVE-2024-10825
The Hide My WP Ghost – Security & Firewall plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL in all versions up to, and including, 5.3.01 due to insufficient input sanitization and output escaping. This makes it possible for... Read more
Affected Products : hide_my_wp_ghost- Published: Nov. 15, 2024
- Modified: Nov. 20, 2024
-
5.9
MEDIUMCVE-2024-10104
The Jobs for WordPress plugin before 2.7.8 does not sanitise and escape some of its Job settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks... Read more
Affected Products : jobs_for_wordpress- Published: Nov. 15, 2024
- Modified: Apr. 11, 2025
-
6.1
MEDIUMCVE-2024-9356
The Yotpo: Product & Photo Reviews for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'yotpo_user_email' and 'yotpo_user_name' parameters in all versions up to, and including, 1.7.8 due to insufficient input sanit... Read more
Affected Products : yotpo- Published: Nov. 15, 2024
- Modified: Nov. 20, 2024
-
5.3
MEDIUMCVE-2024-42499
Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in FitNesse releases prior to 20241026. If this vulnerability is exploited, an attacker may be able to know whether a file exists at a specific path, and/or obtain... Read more
Affected Products :- Published: Nov. 15, 2024
- Modified: Nov. 18, 2024
-
6.1
MEDIUMCVE-2024-39610
Cross-site scripting vulnerability exists in FitNesse releases prior to 20241026. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the product.... Read more
Affected Products : fitnesse- Published: Nov. 15, 2024
- Modified: Nov. 20, 2024
-
7.2
HIGHCVE-2024-10793
The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user_id parameter in all versions up to, and including, 5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthentica... Read more
Affected Products : wp_activity_log- Published: Nov. 15, 2024
- Modified: Nov. 19, 2024
-
4.3
MEDIUMCVE-2024-10582
The Music Player for Elementor – Audio Player & Podcast Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_mpfe_template() function in all versions up to, and including, 2.4.1. Th... Read more
Affected Products : music_player_for_elementor- Published: Nov. 15, 2024
- Modified: Nov. 19, 2024
-
7.2
HIGHCVE-2024-10260
The Tripetto plugin for WordPress is vulnerable to Stored Cross-Site Scripting via File uploads in all versions up to, and including, 8.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to... Read more
Affected Products : tripetto- Published: Nov. 15, 2024
- Modified: Nov. 19, 2024
-
6.4
MEDIUMCVE-2024-10113
The WP AdCenter – Ad Manager & Adsense Ads plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpadcenter_ad shortcode in all versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping on... Read more
Affected Products : wp_adcenter- Published: Nov. 15, 2024
- Modified: Nov. 19, 2024
-
6.1
MEDIUMCVE-2024-9609
The LearnPress Export Import – WordPress extension for LearnPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'learnpress_import_form_server' parameter in all versions up to, and including, 4.0.4 due to insufficient input ... Read more
Affected Products : learnpress_export_import- Published: Nov. 15, 2024
- Modified: Nov. 19, 2024
-
4.3
MEDIUMCVE-2024-10897
The Tutor LMS Elementor Addons plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the install_etlms_dependency_plugin() function in all versions up to, and including, 2.1.5. This makes it possible f... Read more
Affected Products : tutor_lms_elementor_addons- Published: Nov. 15, 2024
- Modified: Nov. 20, 2024
-
9.8
CRITICALCVE-2024-10924
The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_logi... Read more
Affected Products : really_simple_security- Published: Nov. 15, 2024
- Modified: Nov. 20, 2024
-
9.8
CRITICALCVE-2024-11120
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploite... Read more
Affected Products : gv-vs12_firmware gv-vs12 gv-vs11_firmware gv-vs11 gv-dsp_lpr_firmware gv-dsp_lpr gvlx_4_firmware gvlx_4- Actively Exploited
- Published: Nov. 15, 2024
- Modified: May. 09, 2025
-
5.5
MEDIUMCVE-2024-52613
A heap-based buffer under-read in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) via a crafted MOV video file.... Read more
Affected Products : tsmuxer- Published: Nov. 14, 2024
- Modified: Nov. 20, 2024
-
9.6
CRITICALCVE-2024-52308
The GitHub CLI version 2.6.1 and earlier are vulnerable to remote code execution through a malicious codespace SSH server when using `gh codespace ssh` or `gh codespace logs` commands. This has been patched in the cli v2.62.0. Developers connect to remot... Read more
Affected Products : cli- Published: Nov. 14, 2024
- Modified: Nov. 20, 2024
-
8.8
HIGHCVE-2024-49778
A heap-based buffer overflow in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) and Code Execution via a crafted MOV video file.... Read more
Affected Products :- Published: Nov. 14, 2024
- Modified: Nov. 15, 2024