Latest CVE Feed
-
9.8
CRITICALCVE-2024-48033
Deserialization of Untrusted Data vulnerability in Elie Burstein, Baptiste Gourdin Talkback allows Object Injection.This issue affects Talkback: from n/a through 1.0.... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.1
MEDIUMCVE-2024-9670
The 2D Tag Cloud plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 6.0.2. This makes it possible for unauthenticated attackers... Read more
Affected Products :- Published: Oct. 12, 2024
- Modified: Oct. 15, 2024
-
6.5
MEDIUMCVE-2024-48041
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CreativeMindsSolutions CM Tooltip Glossary allows Stored XSS.This issue affects CM Tooltip Glossary: from n/a through 4.3.9.... Read more
Affected Products :- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
8.5
HIGHCVE-2024-48040
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tainacan.Org Tainacan allows SQL Injection.This issue affects Tainacan: from n/a through 0.21.8.... Read more
Affected Products : tainacan- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
6.3
MEDIUMCVE-2024-9907
A vulnerability classified as problematic was found in QileCMS up to 1.1.3. This vulnerability affects the function sendEmail of the file /qilecms/user/controller/Forget.php of the component Verification Code Handler. The manipulation leads to weak passwo... Read more
Affected Products :- Published: Oct. 13, 2024
- Modified: Oct. 15, 2024
-
4.3
MEDIUMCVE-2024-9824
The ImagePress – Image Gallery plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'ip_delete_post' and 'ip_update_post_title' functions in all versions up to, and including, 1.2.2. Thi... Read more
Affected Products : imagepress- Published: Oct. 12, 2024
- Modified: Oct. 15, 2024
-
8.8
HIGHCVE-2024-9821
The Bot for Telegram on WooCommerce plugin for WordPress is vulnerable to sensitive information disclosure due to missing authorization checks on the 'stm_wpcfto_get_settings' AJAX action in all versions up to, and including, 1.2.4. This makes it possible... Read more
Affected Products :- Published: Oct. 12, 2024
- Modified: Oct. 15, 2024
-
7.3
HIGHCVE-2024-9837
The The AADMY – Add Auto Date Month Year Into Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.1. This is due to the software allowing users to execute an action that does not properly val... Read more
Affected Products :- Published: Oct. 15, 2024
- Modified: Oct. 15, 2024
-
7.2
HIGHCVE-2024-8757
The WP Post Author – Boost Your Blog's Engagement with Author Box, Social Links, Co-Authors, Guest Authors, Post Rating System, and Custom User Registration Form Builder plugin for WordPress is vulnerable to time-based SQL Injection via the linked_us... Read more
Affected Products : wp_post_author- Published: Oct. 12, 2024
- Modified: Oct. 15, 2024
-
9.8
CRITICALCVE-2024-9924
The fix for CVE-2024-26261 was incomplete, and and the specific package for OAKlouds from Hgiga remains at risk. Unauthenticated remote attackers still can download arbitrary system files, which may be deleted subsequently .... Read more
Affected Products : oaklouds_portal- Published: Oct. 14, 2024
- Modified: Oct. 15, 2024
-
8.5
HIGHCVE-2024-48020
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Revmakx Backup and Staging by WP Time Capsule allows SQL Injection.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.21.... Read more
Affected Products : backup_and_staging_by_wp_time_capsule- Published: Oct. 11, 2024
- Modified: Oct. 15, 2024
-
9.8
CRITICALCVE-2024-45698
Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on... Read more
- Published: Sep. 16, 2024
- Modified: Oct. 15, 2024
-
9.8
CRITICALCVE-2024-9142
External Control of File Name or Path, : Incorrect Permission Assignment for Critical Resource vulnerability in Olgu Computer Systems e-Belediye allows Manipulating Web Input to File System Calls.This issue affects e-Belediye: before 2.0.642.... Read more
Affected Products :- Published: Sep. 25, 2024
- Modified: Oct. 14, 2024
-
8.7
HIGHCVE-2024-47790
** UNSUPPORTED WHEN ASSIGNED ** This vulnerability exists in D3D Security IP Camera D8801 due to usage of insecure Real-Time Streaming Protocol (RTSP) version for live video streaming. A remote attacker could exploit this vulnerability by crafting a RTSP... Read more
Affected Products :- Published: Oct. 04, 2024
- Modified: Oct. 14, 2024
-
8.7
HIGHCVE-2024-47789
** UNSUPPORTED WHEN ASSIGNED ** This vulnerability exists in D3D Security IP Camera D8801 due to usage of weak authentication scheme of the HTTP header protocol where authorization tag contain a Base-64 encoded username and password. A remote attacker cou... Read more
Affected Products :- Published: Oct. 04, 2024
- Modified: Oct. 14, 2024
-
6.5
MEDIUMCVE-2024-45132
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low-privileged attacker could leverage this vulnerability to bypass security m... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 14, 2024
-
5.4
MEDIUMCVE-2024-45131
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass secur... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 14, 2024
-
5.4
MEDIUMCVE-2024-45128
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass secur... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 14, 2024
-
2.7
LOWCVE-2024-45135
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An admin attacker could leverage this vulnerability to bypass security mea... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 11, 2024
-
2.7
LOWCVE-2024-45134
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An admin attacker could leverage this vulnerability to have a low impact on c... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 11, 2024