VUMETRIC
CYBER PORTAL
Dashboard
Security News
Latest Vulnerabilities
Browse Vulnerabilities
by Vendors
by Products
by Categories
Weekly Reports
Vulnerabilities
Exclude new CVEs:
DATE
CVE
VULNERABILITY TITLE
RISK
2025-02-10
CVE-2024-11831
A flaw was found in npm-serialize-javascript.
network
low complexity
CWE-79
5.4
5.4
2025-02-10
CVE-2024-12133
A flaw in libtasn1 causes inefficient handling of specific certificate data.
network
low complexity
CWE-407
5.3
5.3
2025-02-10
CVE-2024-12243
A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing.
network
low complexity
CWE-407
5.3
5.3
2025-02-10
CVE-2025-1149
A vulnerability was found in GNU Binutils 2.43.
network
high complexity
CWE-401
3.1
3.1
2025-02-10
CVE-2025-1147
A vulnerability has been found in GNU Binutils 2.43 and classified as problematic.
network
high complexity
CWE-120
3.1
3.1
2025-02-10
CVE-2025-1148
A vulnerability was found in GNU Binutils 2.43 and classified as problematic.
network
high complexity
CWE-401
3.1
3.1
2025-02-09
CVE-2024-13440
The Super Store Finder plugin for WordPress is vulnerable to SQL Injection via the ‘ssf_wp_user_name’ parameter in all versions up to, and including, 7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
network
low complexity
CWE-89
7.5
7.5
2025-02-08
CVE-2025-0169
The DWT - Directory & Listing WordPress Theme is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping on user supplied attributes.
network
low complexity
CWE-79
6.4
6.4
2025-02-08
CVE-2025-0316
The WP Directorybox Manager plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5.
network
low complexity
CWE-288
critical
9.8
9.8
2025-02-08
CVE-2024-54176
IBM DevOps Deploy 8.0 through 8.0.1.4, 8.1 through 8.1.0.0 and IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.25, 7.1 through 7.1.2.21, 7.2 through 7.2.3.14 and 7.3 through 7.3.2 could allow an authenticated user to obtain sensitive information about other users on the system due to missing authorization for a function.
network
low complexity
CWE-306
4.3
4.3
«
1
(current)
2
3
4
5
...
16274
16275
»
Next