Latest CVE Feed
-
8.7
HIGHCVE-2020-26310
Validate.js provides a declarative way of validating javascript objects. All versions as of 30 November 2020 contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unkn... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26309
Validate.js provides a declarative way of validating javascript objects. Versions 0.11.3 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26308
Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26307
HTML2Markdown is a Javascript implementation for converting HTML to Markdown text. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patc... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26306
Knwl.js is a Javascript library that parses through text for dates, times, phone numbers, emails, places, and more. Versions 1.0.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.7
HIGHCVE-2020-26305
CommonRegexJS is a CommonRegex port for JavaScript. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.... Read more
Affected Products : commonregexjs- Published: Oct. 26, 2024
- Modified: Nov. 13, 2024
-
8.7
HIGHCVE-2020-26304
Foundation is a front-end framework. Versions 6.3.3 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any fixes are available.... Read more
Affected Products : foundation- Published: Oct. 26, 2024
- Modified: Nov. 13, 2024
-
8.7
HIGHCVE-2020-26303
insane is a whitelist-oriented HTML sanitizer. Versions 2.6.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.... Read more
Affected Products : insane- Published: Oct. 26, 2024
- Modified: Nov. 13, 2024
-
9.8
CRITICALCVE-2024-9501
The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.0.7. This is due to insufficient verification on the user being returned by the social login token. This ma... Read more
Affected Products : wp_social_login_and_register_social_counter- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.8
HIGHCVE-2024-10402
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 1.35.1. This makes it possible for auth... Read more
- Published: Oct. 26, 2024
- Modified: Feb. 05, 2025
-
6.4
MEDIUMCVE-2024-10117
The WP Crowdfunding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcf_donate shortcode in all versions up to, and including, 2.1.11 due to insufficient input sanitization and output escaping on user supplied attribute... Read more
Affected Products : wp_crowdfunding- Published: Oct. 26, 2024
- Modified: Feb. 11, 2025
-
7.3
HIGHCVE-2024-9772
The The Uix Shortcodes – Compatible with Gutenberg plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.9.9. This is due to the software allowing users to execute an action that does not properly vali... Read more
Affected Products : uix_shortcodes- Published: Oct. 26, 2024
- Modified: Nov. 25, 2024
-
6.4
MEDIUMCVE-2024-9116
The Monkee-Boy Essentials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
4.3
MEDIUMCVE-2024-10357
The Clever Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.1 via the getTemplateContent function in src/widgets/class-clever-widget-base.php. This makes it possible for au... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9967
The WP show more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's show_more shortcode in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. Thi... Read more
Affected Products : wp_show_more- Published: Oct. 26, 2024
- Modified: Nov. 22, 2024
-
6.4
MEDIUMCVE-2024-9853
The ID-SK Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attac... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
6.4
MEDIUMCVE-2024-9642
The Editor Custom Color Palette plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.3.7 due to insufficient input sanitization and output escaping. This makes it possible for authe... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
8.8
HIGHCVE-2024-9637
The School Management System – WPSchoolPress plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.10. This is due to the plugin not properly validating a user's identity prior to updatin... Read more
Affected Products : wpschoolpress- Published: Oct. 26, 2024
- Modified: Jul. 10, 2025
-
7.2
HIGHCVE-2024-8392
The WordPress Post Grid Layouts with Pagination – Sogrid plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.5.2 via the 'tab' parameter. This makes it possible for authenticated attackers, with Administrator... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024
-
7.1
HIGHCVE-2024-0128
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager that allows a user of the guest OS to access global resources. A successful exploit of this vulnerability might lead to information disclosure, data tampering, and escalation of priv... Read more
Affected Products :- Published: Oct. 26, 2024
- Modified: Oct. 28, 2024