6.5

CVSS3.1

CVE-2024-4194 - Album and Image Gallery plus Lightbox <= 2.0 - Unauthenticated Arbitrary Shortcode Execution

The The Album and Image Gallery plus Lightbox plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This make…

📅 Published: June 6, 2024, 2:02 a.m. 🔄 Last Modified: April 8, 2026, 6:21 p.m.

6.1

CVSS3.1

CVE-2023-6956 - EasyAzon – Amazon Associates Affiliate Plugin <= 5.1.0 - Reflected Cross-Site Scripting via easyazo…

The EasyAzon – Amazon Associates Affiliate Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘easyazon-cloaking-locale’ parameter in all versions up to, and including, 5.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unau…

📅 Published: June 6, 2024, 2:02 a.m. 🔄 Last Modified: April 8, 2026, 4:47 p.m.

5.3

CVSS3.1

CVE-2024-0910 - Restrict for Elementor <= 1.0.7 - Protection Mechanism Bypass

The Restrict for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.7 due to improper restrictions on hidden data that make it accessible through the REST API. This makes it possible for unauthenticated attackers to extract poten…

📅 Published: June 6, 2024, 2:02 a.m. 🔄 Last Modified: April 8, 2026, 5:17 p.m.

8.1

CVSS3.1

CVE-2023-6968 - The Moneytizer <= 9.6.3 - Cross-Site Request Forgery via multiple AJAX actions

The The Moneytizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 9.6.3. This is due to missing or incorrect nonce validation on multiple AJAX functions. This makes it possible for unauthenticated attackers to to update and retrieve billing an…

📅 Published: June 6, 2024, 2:02 a.m. 🔄 Last Modified: April 8, 2026, 5:17 p.m.

4.4

CVSS3.1

CVE-2024-4942 - Custom Dash <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting

The Custom Dash plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and a…

📅 Published: June 6, 2024, 2:02 a.m. 🔄 Last Modified: April 8, 2026, 5:18 p.m.

6.4

CVSS3.1

CVE-2024-5342 - Simple Image Popup Shortcode <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via …

The Simple Image Popup Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sips_popup' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for aut…

📅 Published: June 6, 2024, 2:02 a.m. 🔄 Last Modified: April 8, 2026, 4:36 p.m.

4.3

CVSS3.1

CVE-2024-4788 - Boostify Header Footer Builder for Elementor <= 1.3.5 - Missing Authorization to Page/Post Creation

The Boostify Header Footer Builder for Elementor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the create_bhf_post function in all versions up to, and including, 1.3.5. This makes it possible for authenticated attackers, with subscriber…

📅 Published: June 6, 2024, 2:02 a.m. 🔄 Last Modified: April 8, 2026, 5:18 p.m.

8.8

CVSS3.1

CVE-2024-5324 - XootiX Framework <= Various Plugin Versions - Missing Authorization to Arbitrary Options Update

Multiple plugins for WordPress utilizing the XootiX Framework are vulnerable to unauthorized modification of data due to a missing capability check on the 'import_settings' function in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to c…

📅 Published: June 6, 2024, 2:02 a.m. 🔄 Last Modified: April 8, 2026, 5:19 p.m.

4.3

CVSS3.1

CVE-2024-36106 - Argo CD allows authenticated users to enumerate clusters by name

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It’s possible for authenticated users to enumerate clusters by name by inspecting error messages. It’s also possible to enumerate the names of projects with project-scoped clusters if you know the names of the clusters. This …

📅 Published: June 6, 2024, midnight 🔄 Last Modified: Nov. 21, 2024, 9:21 a.m.

4.7

CVSS3.1

CVE-2024-5206 - Sensitive Data Leakage in sklearn.feature_extraction.text.TfidfVectorizer in scikit-learn/scikit-le…

A sensitive data leakage vulnerability was identified in scikit-learn's TfidfVectorizer, specifically in versions up to and including 1.4.1.post1, which was fixed in version 1.5.0. The vulnerability arises from the unexpected storage of all tokens present in the training data within the `stop_words…

📅 Published: June 6, 2024, midnight 🔄 Last Modified: Nov. 21, 2024, 9:47 a.m.
Total resulsts: 345145
Page 9169 of 34,515
« previous page » next page
Filters