Latest CVE Feed
-
9.3
CRITICALCVE-2024-6915
JFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning.... Read more
Affected Products : artifactory- Published: Aug. 05, 2024
- Modified: Aug. 06, 2024
-
7.2
HIGHCVE-2024-7485
The Traffic Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page' parameter in the 'UserWebStat' AJAX function in all versions up to, and including, 1.4.5 due to insufficient input sanitization and output escaping. This ... Read more
Affected Products :- Published: Aug. 06, 2024
- Modified: Aug. 06, 2024
-
7.5
HIGHCVE-2024-28297
SQL injection vulnerability in AzureSoft MyHorus 4.3.5 allows authenticated users to execute arbitrary SQL commands via unspecified vectors.... Read more
Affected Products :- Published: Aug. 02, 2024
- Modified: Aug. 05, 2024
-
7.2
HIGHCVE-2024-7291
The JetFormBuilder plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3.4.1. This is due to improper restriction on user meta fields. This makes it possible for authenticated attackers, with administrator-le... Read more
Affected Products :- Published: Aug. 03, 2024
- Modified: Aug. 05, 2024
-
9.8
CRITICALCVE-2024-7257
The YayExtra – WooCommerce Extra Product Options plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_upload_file function in all versions up to, and including, 1.3.7. This makes it possible for un... Read more
Affected Products :- Published: Aug. 03, 2024
- Modified: Aug. 05, 2024
-
7.1
HIGHCVE-2024-22169
WD Discovery versions prior to 5.0.589 contain a misconfiguration in the Node.js environment settings that could allow code execution by utilizing the 'ELECTRON_RUN_AS_NODE' environment variable. Any malicious application operating with standard user perm... Read more
Affected Products : wd_discovery- Published: Aug. 02, 2024
- Modified: Aug. 05, 2024
-
7.5
HIGHCVE-2024-41265
A TLS certificate verification issue discovered in cortex v0.42.1 allows attackers to obtain sensitive information via the makeOperatorRequest function.... Read more
Affected Products :- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
4.8
MEDIUMCVE-2024-25948
Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more
Affected Products : emc_idrac_service_module- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
4.8
MEDIUMCVE-2024-25947
Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more
Affected Products : emc_idrac_service_module- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
4.4
MEDIUMCVE-2024-38489
Dell iDRAC Service Module version 5.3.0.0 and prior contains Out of bound write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service (partial) event.... Read more
Affected Products : emc_idrac_service_module- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
5.8
MEDIUMCVE-2024-38490
Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more
Affected Products : emc_idrac_service_module- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
4.8
MEDIUMCVE-2024-38481
Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more
Affected Products : emc_idrac_service_module- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
8.1
HIGHCVE-2024-41956
Soft Serve is a self-hostable Git server for the command line. Prior to 0.7.5, it is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git. The issue is that Soft Serve... Read more
Affected Products : soft_serve- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
9.8
CRITICALCVE-2024-38770
Improper Privilege Management vulnerability in Revmakx Backup and Staging by WP Time Capsule allows Privilege Escalation, Authentication Bypass.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.20.... Read more
Affected Products : backup_and_staging_by_wp_time_capsule- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
7.2
HIGHCVE-2024-38775
Improper Privilege Management vulnerability in WebAppick CTX Feed allows Privilege Escalation.This issue affects CTX Feed: from n/a through 6.5.6.... Read more
Affected Products :- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
7.1
HIGHCVE-2024-38746
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in MakeStories Team MakeStories (for Google Web Stories) allows Path Traversal, Server Side Request Forgery.This issue affects MakeStories (for Google Web Stories... Read more
Affected Products : makestories_\(for_google_web_stories\)- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
7.1
HIGHCVE-2024-38776
Cross-Site Request Forgery (CSRF) vulnerability in Martin Gibson WP GoToWebinar allows Cross-Site Scripting (XSS).This issue affects WP GoToWebinar: from n/a through 15.7.... Read more
Affected Products : gotowebinar- Published: Aug. 02, 2024
- Modified: Aug. 02, 2024
-
9.4
CRITICALCVE-2024-7093
Dispatch's notification service uses Jinja templates to generate messages to users. Jinja permits code execution within blocks, which were neither properly sanitized nor sandboxed. This vulnerability enables users to construct command line scripts in thei... Read more
Affected Products : dispatch- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
8.8
HIGHCVE-2024-39634
Improper Privilege Management vulnerability in IdeaBox PowerPack Pro for Elementor allows Privilege Escalation.This issue affects PowerPack Pro for Elementor: from n/a through 2.10.14.... Read more
Affected Products :- Published: Aug. 01, 2024
- Modified: Aug. 02, 2024
-
8.8
HIGHCVE-2024-3238
The WordPress Menu Plugin — Superfly Responsive Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.0.29. This is due to missing or incorrect nonce validation on the ajax_handle_delete_icons() func... Read more
Affected Products :- Published: Aug. 02, 2024
- Modified: Aug. 02, 2024