0.0

CVE-2024-54270 - WordPress Axeptio plugin <= 2.5.4 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Axeptio Axeptio axeptio-sdk-integration allows PHP Local File Inclusion.This issue affects Axeptio: from n/a through <= 2.5.4.

📅 Published: Dec. 18, 2024, 11:38 a.m. 🔄 Last Modified: April 1, 2026, 4:20 p.m.

0.0

CVE-2024-56058 - WordPress VRPConnector plugin <= 2.0.1 - PHP Object Injection vulnerability

Deserialization of Untrusted Data vulnerability in denniskravetstns VRPConnector vrpconnector allows Object Injection.This issue affects VRPConnector: from n/a through <= 2.0.1.

📅 Published: Dec. 18, 2024, 11:38 a.m. 🔄 Last Modified: April 1, 2026, 4:21 p.m.

0.0

CVE-2024-56059 - WordPress Partners plugin <= 0.2.0 - PHP Object Injection vulnerability

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in farinspace Partners partners allows Object Injection.This issue affects Partners: from n/a through <= 0.2.0.

📅 Published: Dec. 18, 2024, 11:38 a.m. 🔄 Last Modified: April 1, 2026, 4:21 p.m.

0.0

CVE-2024-56008 - WordPress Spreadr Woocommerce plugin <= 1.0.4 - Arbitrary Content Deletion vulnerability

Missing Authorization vulnerability in spreadr Spreadr Woocommerce spreadr-for-woocomerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Spreadr Woocommerce: from n/a through <= 1.0.4.

📅 Published: Dec. 18, 2024, 11:38 a.m. 🔄 Last Modified: April 1, 2026, 4:21 p.m.

9.3

CVSS4.0

CVE-2024-4996 - Hardcoded Password in Wapro ERP Desktop

Use of a hard-coded password for a database administrator account created during Wapro ERP installation allows an attacker to retrieve embedded sensitive data stored in the database. The password is same among all Wapro ERP installations. This issue affects Wapro ERP Desktop versions before 8.90.0.

📅 Published: Dec. 18, 2024, 11:37 a.m. 🔄 Last Modified: Oct. 7, 2025, 1:21 p.m.

9.1

CVSS4.0

CVE-2024-4995 - Protocol Downgrade in Wapro ERP Desktop

Wapro ERP Desktop is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification. This issue affects Wapro ERP Desktop versions before 9.00.0.

📅 Published: Dec. 18, 2024, 11:36 a.m. 🔄 Last Modified: Oct. 7, 2025, 1:20 p.m.

7.5

CVSS3.1

CVE-2024-11912 - Traveler <= 3.1.6 - Unauthenticated SQL Injection via order_id

The Travel Booking WordPress Theme theme for WordPress is vulnerable to blind time-based SQL Injection via the ‘order_id’ parameter in all versions up to, and including, 3.1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. …

📅 Published: Dec. 18, 2024, 11:09 a.m. 🔄 Last Modified: April 8, 2026, 5:35 p.m.

5.3

CVSS3.1

CVE-2024-11291 - Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction <=…

The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.13.4 via the WordPress core search feature. This makes it possible for unauthenticated at…

📅 Published: Dec. 18, 2024, 11:09 a.m. 🔄 Last Modified: April 8, 2026, 5:29 p.m.

6.5

CVSS3.1

CVE-2024-11926 - Traveler <= 3.1.6 - Missing Authorization in Several AJAX Actions

The Travel Booking WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '__stPartnerCreateServiceRental', 'st_delete_order_item', '_st_partner_approve_booking', 'save_order_item', and '__userDenyEachInfo' functions in all v…

📅 Published: Dec. 18, 2024, 11:09 a.m. 🔄 Last Modified: April 8, 2026, 5:25 p.m.

6.8

CVSS3.1

CVE-2024-47104 - IBM i incorrect privilege assignment

IBM i 7.4 and 7.5 is vulnerable to an authenticated user gaining elevated privilege to a physical file. A user with authority to a view can alter the based-on physical file security attributes without having object management rights to the physical file. A malicious actor can use the elevated privi…

📅 Published: Dec. 18, 2024, 10:53 a.m. 🔄 Last Modified: July 3, 2025, 8:54 p.m.
Total resulsts: 343932
Page 6900 of 34,394
« previous page » next page
Filters