Search

Search Results (332872 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-52395 1 Quantumcloud 1 Floating Buttons 2024-11-20 5.3 Medium
Missing Authorization vulnerability in QunatumCloud Floating Buttons for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Floating Buttons for WooCommerce: from n/a through 2.8.8.
CVE-2024-11241 2 Anisha, Code-projects 2 Job Recruitment, Job Recruitment 2024-11-20 7.3 High
A vulnerability was found in code-projects Job Recruitment 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file reset.php. The manipulation of the argument e leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-40638 1 Glpi-project 1 Glpi 2024-11-20 8.1 High
GLPI is a free asset and IT management software package. An authenticated user can exploit multiple SQL injection vulnerabilities. One of them can be used to alter another user account data and take control of it. Upgrade to 10.0.17.
CVE-2024-52427 2 Saso Nikolov, Vollstart 2 Event Tickets With Ticket Scanner, Event Tickets With Ticket Scanner 2024-11-20 9.9 Critical
Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Saso Nikolov Event Tickets with Ticket Scanner allows Server Side Include (SSI) Injection.This issue affects Event Tickets with Ticket Scanner: from n/a through 2.3.11.
CVE-2024-52428 1 Scripteo 2 Ads Booster, Ads Booster By Ads Pro 2024-11-20 8.1 High
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Scripteo Ads Booster by Ads Pro allows PHP Local File Inclusion.This issue affects Ads Booster by Ads Pro: from n/a through 1.12.
CVE-2024-52429 2 Anton Hoelstad, Antonhoelstad 2 Wp Quick Setup, Wp Quick Setup 2024-11-20 9.9 Critical
Unrestricted Upload of File with Dangerous Type vulnerability in Anton Hoelstad WP Quick Setup allows Upload a Web Shell to a Web Server.This issue affects WP Quick Setup: from n/a through 2.0.
CVE-2024-52430 1 Lis 1 Video Gallery 2024-11-20 9.8 Critical
Deserialization of Untrusted Data vulnerability in Lis Lis Video Gallery allows Object Injection.This issue affects Lis Video Gallery: from n/a through 0.2.1.
CVE-2024-52431 1 Pressaholic 1 Wordpress Video Robot 2024-11-20 9.3 Critical
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pressaholic WordPress Video Robot - The Ultimate Video Importer allows SQL Injection.This issue affects WordPress Video Robot - The Ultimate Video Importer: from n/a through 1.20.0.
CVE-2024-52432 2 Nix Solutions, Nixsolutions 2 Nix Anti-spam Light, Nix Anti-spam Light 2024-11-20 9.8 Critical
Deserialization of Untrusted Data vulnerability in NIX Solutions Ltd NIX Anti-Spam Light allows Object Injection.This issue affects NIX Anti-Spam Light: from n/a through 0.0.4.
CVE-2024-52433 1 Mindstien 1 My Geo Posts Free 2024-11-20 9.8 Critical
Deserialization of Untrusted Data vulnerability in Mindstien Technologies My Geo Posts Free allows Object Injection.This issue affects My Geo Posts Free: from n/a through 1.2.
CVE-2024-52436 1 Wpexperts 1 Post Smtp 2024-11-20 7.6 High
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Post SMTP allows Blind SQL Injection.This issue affects Post SMTP: from n/a through 2.9.9.
CVE-2024-41678 1 Glpi-project 1 Glpi 2024-11-20 6.5 Medium
GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17.
CVE-2024-41679 1 Glpi-project 1 Glpi 2024-11-20 6.5 Medium
GLPI is a free asset and IT management software package. An authenticated user can exploit a SQL injection vulnerability from the ticket form. Upgrade to 10.0.17.
CVE-2024-43417 1 Glpi-project 1 Glpi 2024-11-20 6.5 Medium
GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the Software form. Upgrade to 10.0.17.
CVE-2024-43418 1 Glpi-project 1 Glpi 2024-11-20 6.5 Medium
GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17.
CVE-2024-45608 1 Glpi-project 1 Glpi 2024-11-20 6.5 Medium
GLPI is a free asset and IT management software package. An authenticated user can perfom a SQL injection by changing its preferences. Upgrade to 10.0.17.
CVE-2024-52419 1 Maheshwaghmare 1 Copy Anything To Clipboard 2024-11-20 6.5 Medium
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Clipboard Team Copy Anything to Clipboard allows Stored XSS.This issue affects Copy Anything to Clipboard: from n/a through 4.0.3.
CVE-2024-11308 1 Trcore 1 Dvc 2024-11-20 6.2 Medium
The DVC from TRCore encrypts files using a hardcoded key. Attackers can use this key to decrypt the files and restore the original content.
CVE-2024-11309 1 Trcore 1 Dvc 2024-11-20 7.5 High
The DVC from TRCore has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
CVE-2024-11310 1 Trcore 1 Dvc 2024-11-20 7.5 High
The DVC from TRCore has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.