8.3
CVE-2024-7419 - WP All Export Pro <= 1.9.1 - Unauthenticated Remote Code Execution via Custom Export Fields
The WP ALL Export Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.1 via the custom export fields. This is due to the missing input validation and sanitization of user-supplied data. This makes it possible for unauthenticated attackers to injโฆ
7.2
CVE-2024-9664 - WP All Import Pro <= 4.9.7 - Authenticated (Administrator+) PHP Object Injection via Import File
The WP All Import Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.9.7 via deserialization of untrusted input from an import file. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Objโฆ
7.1
CVE-2025-1103 - D-Link DIR-823X HTTP POST Request set_wifi_blacklists null pointer dereference
A vulnerability, which was classified as problematic, was found in D-Link DIR-823X 240126/240802. This affects the function set_wifi_blacklists of the file /goform/set_wifi_blacklists of the component HTTP POST Request Handler. The manipulation of the argument macList leads to null pointer derefereโฆ
8.7
CVE-2024-10383 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab VSCoโฆ
An issue has been discovered in the gitlab-web-ide-vscode-fork component distributed over CDN affecting all versions prior to 1.89.1-1.0.0-dev-20241118094343and used by all versions of GitLab CE/EE starting from 15.11 prior to 17.3 and which also temporarily affected versions 17.4, 17.5 and 17.6, wโฆ
8.6
CVE-2025-1108 - Insufficient data authenticity vulnerability in Janto
Insufficient data authenticity verification vulnerability in Janto, versions prior to r12. This allows an unauthenticated attacker to modify the content of emails sent to reset the password. To exploit the vulnerability, the attacker must create a POST request by injecting malicious content into thโฆ
9.9
CVE-2025-1107 - Unverified password change vulnerability in Janto
Unverified password change vulnerability in Janto, versions prior to r12. This could allow an unauthenticated attacker to change another user's password without knowing their current password. To exploit the vulnerability, the attacker must create a specific POST request and send it to the endpointโฆ
6.5
CVE-2025-25069 - Apache Kvrocks: Cross-Protocol Scripting Vulnerability
A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks. Since Kvrocks didn't detect if "Host:" or "POST" appears in RESP requests, a valid HTTP request can also be sent to Kvrocks as a valid RESP request and trigger some database operations, which can beย dangerous when it is chainedโฆ
8.2
CVE-2025-25167 - WordPress BookPress โ For Book Authors Plugin <= 1.2.7 - Broken Access Control vulnerability
Missing Authorization vulnerability in Black and White BookPress โ For Book Authors book-press allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects BookPress โ For Book Authors: from n/a through <= 1.2.7.
7.1
CVE-2025-25168 - WordPress BookPress โ For Book Authors Plugin <= 1.2.7 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Black and White BookPress โ For Book Authors book-press allows Cross-Site Scripting (XSS).This issue affects BookPress โ For Book Authors: from n/a through <= 1.2.7.
7.1
CVE-2025-25166 - WordPress InLocation plugin <= 1.8 - Cross Site Scripting (XSS) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in gabrieldarezzo InLocation inlocation allows Stored XSS.This issue affects InLocation: from n/a through <= 1.8.