Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-10-18 | CVE-2024-9848 | Cross-site Scripting vulnerability in K2-Service Product Customizer Light The Product Customizer Light plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. | 5.4 |
2024-10-18 | CVE-2024-9892 | Cross-site Scripting vulnerability in Arelthiaphillips ADD Widget After Content The Add Widget After Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. | 4.8 |
2024-10-18 | CVE-2024-10118 | SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. | 9.8 |
2024-10-18 | CVE-2024-9264 | Command Injection vulnerability in Grafana 11.0.0 The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. | 8.8 |
2024-10-18 | CVE-2024-49023 | Unspecified vulnerability in Microsoft Edge Chromium Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 5.3 |
2024-10-17 | CVE-2024-10093 | Uncontrolled Search Path Element vulnerability in Vso-Software Convertxtodvd 7.0.0.83 A vulnerability, which was classified as critical, was found in VSO ConvertXtoDvd 7.0.0.83. | 7.8 |
2024-10-17 | CVE-2024-43566 | Unspecified vulnerability in Microsoft Edge Chromium Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 9.8 |
2024-10-17 | CVE-2024-43578 | Unspecified vulnerability in Microsoft Edge Chromium Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.3 |
2024-10-17 | CVE-2024-43579 | Unspecified vulnerability in Microsoft Edge Chromium Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.3 |
2024-10-17 | CVE-2024-43580 | Unspecified vulnerability in Microsoft Edge Chromium Microsoft Edge (Chromium-based) Spoofing Vulnerability | 5.4 |