Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2025-02-01 CVE-2025-0947 Injection vulnerability in Angeljudesuarez Tailoring Management System 1.0
A vulnerability, which was classified as critical, has been found in itsourcecode Tailoring Management System 1.0.
network
low complexity
angeljudesuarez CWE-74
8.8
2025-02-01 CVE-2025-0366 Unspecified vulnerability in Artbees Jupiter X Core
The Jupiter X Core plugin for WordPress is vulnerable to Local File Inclusion to Remote Code Execution in all versions up to, and including, 4.8.7 via the get_svg() function.
network
low complexity
artbees
8.8
2025-02-01 CVE-2024-53295 Unspecified vulnerability in Dell Data Domain Operating System
Dell PowerProtect DD versions prior to 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain an improper access control vulnerability.
local
low complexity
dell
7.8
2025-02-01 CVE-2024-12171 Missing Authorization vulnerability in Elula Wsdesk
The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the 'eh_crm_agent_add_user' AJAX action in all versions up to, and including, 3.2.6.
network
low complexity
elula CWE-862
8.8
2025-02-01 CVE-2024-13343 Missing Authorization vulnerability in Vanquish Woocommerce Customers Manager
The WooCommerce Customers Manager plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ajax_assign_new_roles() function in all versions up to, and including, 31.3.
network
low complexity
vanquish CWE-862
8.8
2025-02-01 CVE-2024-51534 Path Traversal vulnerability in Dell Data Domain Operating System
Dell PowerProtect DD versions prior to DDOS 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain a path traversal vulnerability.
local
low complexity
dell CWE-22
7.1
2025-01-31 CVE-2025-0934 SQL Injection vulnerability in Anisha JOB Recruitment 1.0
A vulnerability was found in code-projects Job Recruitment 1.0.
network
low complexity
anisha CWE-89
7.5
2025-01-31 CVE-2023-38739 Cross-Site Request Forgery (CSRF) vulnerability in IBM Sterling B2B Integrator
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
network
low complexity
ibm CWE-352
8.8
2025-01-31 CVE-2024-45650 IBM Security Verify Directory 10.0 through 10.0.3 is vulnerable to a denial of service when sending an LDAP extended operation.
network
low complexity
CWE-754
7.5
2025-01-31 CVE-2025-21671 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: zram: fix potential UAF of zram table If zram_meta_alloc failed early, it frees allocated zram->table without setting it NULL.
local
low complexity
linux CWE-416
7.8