5.3
CVE-2024-13818 - Registration Forms β User Registration Forms, Invitation-Based Registrations, Front-end User Profilβ¦
The Registration Forms β User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.8.4 through publicly exposed log files. This makes β¦
4.3
CVE-2024-13883 - WPUpper Share Buttons <= 3.51 - Cross-Site Request Forgery to Custom CSS Update
The WPUpper Share Buttons plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.51. This is due to missing or incorrect nonce validation on the 'save_custom_css_request' function. This makes it possible for unauthenticated attackers to inject custoβ¦
6.5
CVE-2024-13235 - Pinpoint Booking System β #1 WordPress Booking Plugin <= 2.9.9.5.4 - Authenticated (Subscriber+) SQβ¦
The Pinpoint Booking System β #1 WordPress Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'language' parameter in all versions up to, and including, 2.9.9.5.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing Sβ¦
6.4
CVE-2024-13388 - TCBD Tooltip <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
The TCBD Tooltip plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tcbdtooltip_text' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticatedβ¦
4.9
CVE-2024-38657 -
External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to write arbitrary files.
5.7
CVE-2025-1001 - Medixant RadiAnt DICOM Viewer Improper Certificate Validation
Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server's certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server's response and deliver a malicβ¦
6.5
CVE-2025-27100 - An authenticated user can crash lakeFS by exhausting server memory
lakeFS is an open-source tool that transforms your object storage into a Git-like repository. In affected versions an authenticated user can crash lakeFS by exhausting server memory. This is an authenticated denial-of-service issue. This problem has been patched in version 1.50.0. Users on versionβ¦
7.5
CVE-2025-26794 - exim: Exim: remote SQL injection
Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. (Resolving SQL injection requires an update to 4.99.1 in certain non-default rate-limit configurations.)
4.8
CVE-2025-25767 -
A vertical privilege escalation vulnerability in the component /controller/UserController.java of MRCMS v3.1.2 allows attackers to arbitrarily delete users via a crafted request.
8.2
CVE-2025-26013 -
An issue in Loggrove v.1.0 allows a remote attacker to obtain sensitive information via the read.py component.