Weekly Vulnerabilities Reports > January 27 to February 2, 2025
Overview
302 new vulnerabilities reported during this period, including 26 critical vulnerabilities and 67 high severity vulnerabilities. This weekly summary report vulnerabilities in 106 products from 87 vendors including Apple, IBM, Linux, Santesoft, and Angeljudesuarez. Vulnerabilities are notably categorized as "Cross-site Scripting", "SQL Injection", "Missing Authorization", "Out-of-bounds Write", and "Path Traversal".
- 219 reported vulnerabilities are remotely exploitables.
- 117 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 139 reported vulnerabilities are exploitable by an anonymous user.
- Apple has the most reported vulnerabilities, with 78 reported vulnerabilities.
- Angeljudesuarez has the most reported critical vulnerabilities, with 6 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
26 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2025-02-01 | CVE-2025-0946 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Tailoring Management System 1.0 A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. | 9.8 |
2025-02-01 | CVE-2025-0945 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Tailoring Management System 1.0 A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. | 9.8 |
2025-02-01 | CVE-2025-0944 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Tailoring Management System 1.0 A vulnerability was found in itsourcecode Tailoring Management System 1.0. | 9.8 |
2025-02-01 | CVE-2025-0943 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Tailoring Management System 1.0 A vulnerability was found in itsourcecode Tailoring Management System 1.0. | 9.8 |
2025-01-31 | CVE-2025-0493 | The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Limited Local File Inclusion in all versions up to, and including, 4.2.14 via the tabname parameter. | 9.8 | |
2025-01-30 | CVE-2025-0880 | Codezips | SQL Injection vulnerability in Codezips GYM Management System 1.0 A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. | 9.8 |
2025-01-30 | CVE-2025-0874 | Fabianros | SQL Injection vulnerability in Fabianros Simple CAR Rental System 1.0 A vulnerability, which was classified as critical, has been found in code-projects Simple Plugins Car Rental Management 1.0. | 9.8 |
2025-01-30 | CVE-2025-0873 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Tailoring Management System 1.0 A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. | 9.8 |
2025-01-30 | CVE-2025-0872 | Angeljudesuarez | SQL Injection vulnerability in Angeljudesuarez Tailoring Management System 1.0 A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. | 9.8 |
2025-01-30 | CVE-2024-12822 | Userproplugin | Missing Authorization vulnerability in Userproplugin Media Manager The Media Manager for UserPro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the add_capto_img() function in all versions up to, and including, 3.11.0. | 9.8 |
2025-01-30 | CVE-2024-13742 | Icontrolwp | Deserialization of Untrusted Data vulnerability in Icontrolwp The iControlWP – Multiple WordPress Site Manager plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.4.5 via deserialization of untrusted input from the reqpars parameter. | 9.8 |
2025-01-30 | CVE-2025-0847 | 1000Projects | SQL Injection vulnerability in 1000Projects Employee Task Management System 1.0 A vulnerability was found in 1000 Projects Employee Task Management System 1.0. | 9.8 |
2025-01-30 | CVE-2025-0848 | Tenda | Stack-based Buffer Overflow vulnerability in Tenda A18 Firmware 15.13.07.09 A vulnerability was found in Tenda A18 up to 15.13.07.09. | 9.8 |
2025-01-30 | CVE-2025-0846 | 1000Projects | SQL Injection vulnerability in 1000Projects Employee Task Management System 1.0 A vulnerability was found in 1000 Projects Employee Task Management System 1.0. | 9.8 |
2025-01-29 | CVE-2025-0843 | Needyamin | SQL Injection vulnerability in Needyamin Library Card System 1.0 A vulnerability was found in needyamin Library Card System 1.0. | 9.8 |
2025-01-29 | CVE-2025-0842 | Needyamin | SQL Injection vulnerability in Needyamin Library Card System 1.0 A vulnerability was found in needyamin Library Card System 1.0 and classified as critical. | 9.8 |
2025-01-29 | CVE-2023-35907 | IBM | Weak Password Requirements vulnerability in IBM Aspera Faspex IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. | 9.8 |
2025-01-29 | CVE-2023-37398 | IBM | Weak Password Requirements vulnerability in IBM Aspera Faspex IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. | 9.8 |
2025-01-29 | CVE-2025-0803 | Gymmanagementsystem | SQL Injection vulnerability in Gymmanagementsystem GYM Management System 1.0 A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. | 9.8 |
2025-01-28 | CVE-2024-13448 | Themerex | Unrestricted Upload of File with Dangerous Type vulnerability in Themerex Addons The ThemeREX Addons plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'trx_addons_uploads_save_data' function in all versions up to, and including, 2.32.3. | 9.8 |
2025-01-28 | CVE-2023-50316 | IBM | SQL Injection vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 is vulnerable to SQL injection. | 9.8 |
2025-01-30 | CVE-2024-13720 | Ivanm | Path Traversal vulnerability in Ivanm WP Image Uploader The WP Image Uploader plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the gky_image_uploader_main_function() function in all versions up to, and including, 1.0.1. | 9.1 |
2025-01-27 | CVE-2024-54512 | Apple | Unspecified vulnerability in Apple Watchos The issue was addressed by removing the relevant flags. | 9.1 |
2025-01-27 | CVE-2025-24154 | Apple | Out-of-bounds Write vulnerability in Apple products An out-of-bounds write was addressed with improved input validation. | 9.1 |
2025-01-27 | CVE-2024-55227 | Dolibarr | Cross-site Scripting vulnerability in Dolibarr Erp/Crm 21.0.0 A cross-site scripting (XSS) vulnerability in the Events/Agenda module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter. | 9.0 |
2025-01-27 | CVE-2024-55228 | Dolibarr | Cross-site Scripting vulnerability in Dolibarr Erp/Crm 21.0.0 A cross-site scripting (XSS) vulnerability in the Product module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter. | 9.0 |
67 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2025-01-27 | CVE-2022-4975 | A flaw was found in the Red Hat Advanced Cluster Security (RHACS) portal. | 8.9 | |
2025-02-01 | CVE-2025-0366 | Artbees | Unspecified vulnerability in Artbees Jupiter X Core The Jupiter X Core plugin for WordPress is vulnerable to Local File Inclusion to Remote Code Execution in all versions up to, and including, 4.8.7 via the get_svg() function. | 8.8 |
2025-02-01 | CVE-2024-12171 | Elula | Missing Authorization vulnerability in Elula Wsdesk The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the 'eh_crm_agent_add_user' AJAX action in all versions up to, and including, 3.2.6. | 8.8 |
2025-02-01 | CVE-2024-13343 | Vanquish | Missing Authorization vulnerability in Vanquish Woocommerce Customers Manager The WooCommerce Customers Manager plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ajax_assign_new_roles() function in all versions up to, and including, 31.3. | 8.8 |
2025-01-31 | CVE-2023-38739 | IBM | Cross-Site Request Forgery (CSRF) vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. | 8.8 |
2025-01-30 | CVE-2024-10591 | Makewebbetter | Missing Authorization vulnerability in Makewebbetter Hubspot for Woocommerce The MWB HubSpot for WooCommerce – CRM, Abandoned Cart, Email Marketing, Marketing Automation & Analytics plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hubwoo_save_updates() function in all versions up to, and including, 1.5.9. | 8.8 |
2025-01-30 | CVE-2024-12129 | WP Royal Themes | Missing Authorization vulnerability in Wp-Royal-Themes Royal Core The Royal Core plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'royal_restore_backup' function in all versions up to, and including, 2.9.2. | 8.8 |
2025-01-29 | CVE-2025-21415 | Microsoft | Authentication Bypass by Spoofing vulnerability in Microsoft Azure AI Face Service Authentication bypass by spoofing in Azure AI Face Service allows an authorized attacker to elevate privileges over a network. | 8.8 |
2025-01-27 | CVE-2024-54499 | Apple | Use After Free vulnerability in Apple products A use-after-free issue was addressed with improved memory management. | 8.8 |
2025-01-27 | CVE-2024-54543 | Apple | Out-of-bounds Write vulnerability in Apple products The issue was addressed with improved memory handling. | 8.8 |
2025-01-27 | CVE-2025-24150 | Apple | Command Injection vulnerability in Apple products A privacy issue was addressed with improved handling of files. | 8.8 |
2025-01-27 | CVE-2024-54145 | Cacti | SQL Injection vulnerability in Cacti Cacti is an open source performance and fault management framework. | 8.8 |
2025-01-27 | CVE-2024-54146 | Cacti | SQL Injection vulnerability in Cacti Cacti is an open source performance and fault management framework. | 8.8 |
2025-01-27 | CVE-2025-24742 | Codecabin | Cross-Site Request Forgery (CSRF) vulnerability in Codecabin WP GO Maps Cross-Site Request Forgery (CSRF) vulnerability in WP Go Maps (formerly WP Google Maps) WP Go Maps. | 8.8 |
2025-01-27 | CVE-2025-24782 | Wpwax | PHP Remote File Inclusion vulnerability in Wpwax Post Grid, Slider & Carousel Ultimate Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wpWax Post Grid, Slider & Carousel Ultimate allows PHP Local File Inclusion. | 8.8 |
2025-01-29 | CVE-2025-21396 | Microsoft | Unspecified vulnerability in Microsoft Account Missing authorization in Microsoft Account allows an unauthorized attacker to elevate privileges over a network. | 8.2 |
2025-01-27 | CVE-2024-54468 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 8.2 |
2025-01-27 | CVE-2024-54537 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with additional entitlement checks. | 8.2 |
2025-01-31 | CVE-2024-13767 | The Live2DWebCanvas plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ClearFiles() function in all versions up to, and including, 1.9.11. | 8.1 | |
2025-01-30 | CVE-2024-13646 | Aakashbhagat | Unspecified vulnerability in Aakashbhagat Single User Chat The Single-user-chat plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to insufficient validation on the 'single_user_chat_update_login' function in all versions up to, and including, 0.5. | 8.1 |
2025-01-30 | CVE-2024-13707 | Ivanm | Cross-Site Request Forgery (CSRF) vulnerability in Ivanm WP Image Uploader The WP Image Uploader plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. | 8.1 |
2025-01-30 | CVE-2025-0849 | Campcodes | Unspecified vulnerability in Campcodes School Management Software 1.0 A vulnerability classified as critical has been found in CampCodes School Management Software 1.0. | 8.1 |
2025-01-29 | CVE-2025-0798 | A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. | 8.1 | |
2025-01-29 | CVE-2025-0802 | Mayurik | Unspecified vulnerability in Mayurik Best Employee Management System 1.0 A vulnerability classified as critical was found in SourceCodester Best Employee Management System 1.0. | 8.1 |
2025-02-01 | CVE-2024-53295 | Dell | Unspecified vulnerability in Dell Data Domain Operating System Dell PowerProtect DD versions prior to 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain an improper access control vulnerability. | 7.8 |
2025-01-31 | CVE-2025-21671 | Linux | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: zram: fix potential UAF of zram table If zram_meta_alloc failed early, it frees allocated zram->table without setting it NULL. | 7.8 |
2025-01-31 | CVE-2025-21680 | Linux | Improper Validation of Array Index vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: pktgen: Avoid out-of-bounds access in get_imix_entries Passing a sufficient amount of imix entries leads to invalid access to the pkt_dev->imix_entries array because of the incorrect boundary check. UBSAN: array-index-out-of-bounds in net/core/pktgen.c:874:24 index 20 is out of range for type 'imix_pkt [20]' CPU: 2 PID: 1210 Comm: bash Not tainted 6.10.0-rc1 #121 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) Call Trace: <TASK> dump_stack_lvl lib/dump_stack.c:117 __ubsan_handle_out_of_bounds lib/ubsan.c:429 get_imix_entries net/core/pktgen.c:874 pktgen_if_write net/core/pktgen.c:1063 pde_write fs/proc/inode.c:334 proc_reg_write fs/proc/inode.c:346 vfs_write fs/read_write.c:593 ksys_write fs/read_write.c:644 do_syscall_64 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:130 Found by Linux Verification Center (linuxtesting.org) with SVACE. [ fp: allow to fill the array completely; minor changelog cleanup ] | 7.8 |
2025-01-30 | CVE-2024-44142 | Apple | Unspecified vulnerability in Apple Garageband The issue was addressed with improved bounds checks. | 7.8 |
2025-01-30 | CVE-2025-21107 | Dell | Unquoted Search Path or Element vulnerability in Dell Networker Dell NetWorker, version(s) prior to 19.11.0.3, all versions of 19.10 & prior versions contain(s) an Unquoted Search Path or Element vulnerability. | 7.8 |
2025-01-27 | CVE-2024-54509 | Apple | Out-of-bounds Write vulnerability in Apple Macos An out-of-bounds write issue was addressed with improved input validation. | 7.8 |
2025-01-27 | CVE-2024-54517 | Apple | Out-of-bounds Write vulnerability in Apple products The issue was addressed with improved bounds checks. | 7.8 |
2025-01-27 | CVE-2024-54522 | Apple | Out-of-bounds Write vulnerability in Apple products The issue was addressed with improved bounds checks. | 7.8 |
2025-01-27 | CVE-2025-24085 | Apple | Use After Free vulnerability in Apple products A use after free issue was addressed with improved memory management. | 7.8 |
2025-01-27 | CVE-2025-24107 | Apple | Unspecified vulnerability in Apple products A permissions issue was addressed with additional restrictions. | 7.8 |
2025-01-27 | CVE-2025-24135 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved message validation. | 7.8 |
2025-01-27 | CVE-2025-24156 | Apple | Integer Overflow or Wraparound vulnerability in Apple Macos An integer overflow was addressed through improved input validation. | 7.8 |
2025-01-27 | CVE-2025-24159 | Apple | Unspecified vulnerability in Apple products A validation issue was addressed with improved logic. | 7.8 |
2025-01-27 | CVE-2025-24174 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 7.7 |
2025-02-02 | CVE-2025-0967 | Fabianros | SQL Injection vulnerability in Fabianros Chat System 1.0 A vulnerability was found in code-projects Chat System 1.0 and classified as critical. | 7.5 |
2025-01-31 | CVE-2025-0934 | Anisha | SQL Injection vulnerability in Anisha JOB Recruitment 1.0 A vulnerability was found in code-projects Job Recruitment 1.0. | 7.5 |
2025-01-31 | CVE-2024-45650 | IBM Security Verify Directory 10.0 through 10.0.3 is vulnerable to a denial of service when sending an LDAP extended operation. | 7.5 | |
2025-01-30 | CVE-2025-0568 | Santesoft | Out-of-bounds Write vulnerability in Santesoft Sante Pacs Server Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. | 7.5 |
2025-01-30 | CVE-2025-0569 | Santesoft | Out-of-bounds Write vulnerability in Santesoft Sante Pacs Server Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. | 7.5 |
2025-01-30 | CVE-2025-0574 | Santesoft | Out-of-bounds Write vulnerability in Santesoft Sante Pacs Server Sante PACS Server URL path Memory Corruption Denial-of-Service Vulnerability. | 7.5 |
2025-01-30 | CVE-2025-0882 | Fabianros | SQL Injection vulnerability in Fabianros Chat System 1.0 A vulnerability was found in code-projects Chat System up to 1.0. | 7.5 |
2025-01-30 | CVE-2024-12269 | Wpmessiah | Missing Authorization vulnerability in Wpmessiah Safe AI Malware Protection for WP The Safe Ai Malware Protection for WP plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db() function in all versions up to, and including, 1.0.17. | 7.5 |
2025-01-30 | CVE-2024-13671 | Partitionnumerique | Unspecified vulnerability in Partitionnumerique Music Sheet Viewer The Music Sheet Viewer plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 4.1 via the read_score_file() function. | 7.5 |
2025-01-30 | CVE-2024-13694 | Moreconvert | Authorization Bypass Through User-Controlled Key vulnerability in Moreconvert Woocommerce Wishlist 1.7.2 The WooCommerce Wishlist (High customization, fast setup,Free Elementor Wishlist, most features) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.8.7 via the download_pdf_file() function due to missing validation on a user controlled key. | 7.5 |
2025-01-29 | CVE-2025-0840 | GNU | Stack-based Buffer Overflow vulnerability in GNU Binutils A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. | 7.5 |
2025-01-28 | CVE-2024-11135 | Imithemes | SQL Injection vulnerability in Imithemes Eventer The Eventer plugin for WordPress is vulnerable to SQL Injection via the 'event' parameter in the 'eventer_get_attendees' function in all versions up to, and including, 3.9.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 7.5 |
2025-01-27 | CVE-2024-54557 | Apple | Unspecified vulnerability in Apple Macos A logic issue was addressed with improved restrictions. | 7.5 |
2025-01-27 | CVE-2025-24120 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed by improved management of object lifetimes. | 7.5 |
2025-01-27 | CVE-2025-24129 | Apple | Type Confusion vulnerability in Apple products A type confusion issue was addressed with improved checks. | 7.5 |
2025-01-27 | CVE-2025-24169 | Apple | Unspecified vulnerability in Apple Macos A logging issue was addressed with improved data redaction. | 7.5 |
2025-01-27 | CVE-2025-24177 | Apple | NULL Pointer Dereference vulnerability in Apple Ipados A null pointer dereference was addressed with improved input validation. | 7.5 |
2025-01-31 | CVE-2024-13472 | Wcproducttable | Code Injection vulnerability in Wcproducttable Woocommerce Product Table The The WooCommerce Product Table Lite plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.9.4. | 7.3 |
2025-01-29 | CVE-2025-0841 | A vulnerability has been found in Aridius XYZ up to 20240927 on OpenCart and classified as critical. | 7.3 | |
2025-01-27 | CVE-2025-24126 | Apple | Unspecified vulnerability in Apple products An input validation issue was addressed. | 7.3 |
2025-01-31 | CVE-2024-13504 | The Shared Files – Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via dfxp File uploads in all versions up to, and including, 1.7.42 due to insufficient input sanitization and output escaping. | 7.2 | |
2025-01-31 | CVE-2025-0809 | The Link Fixer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via broken links in all versions up to, and including, 3.4 due to insufficient input sanitization and output escaping. | 7.2 | |
2025-01-30 | CVE-2024-11600 | Visualmodo | Code Injection vulnerability in Visualmodo Borderless The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.5.9 via the 'write_config' function. | 7.2 |
2025-01-30 | CVE-2025-0861 | Vruiz | SQL Injection vulnerability in Vruiz Vr-Frases The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to SQL Injection via several parameters in all versions up to, and including, 3.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 7.2 |
2025-01-29 | CVE-2024-13696 | The Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘wishlist_name’ parameter in all versions up to, and including, 1.2.25 due to insufficient input sanitization and output escaping. | 7.2 | |
2025-01-27 | CVE-2025-22604 | Cacti | OS Command Injection vulnerability in Cacti Cacti is an open source performance and fault management framework. | 7.2 |
2025-01-27 | CVE-2025-0722 | Needyamin | Unrestricted Upload of File with Dangerous Type vulnerability in Needyamin Image Gallery Management System 1.0 A vulnerability classified as critical was found in needyamin image_gallery 1.0. | 7.2 |
2025-02-01 | CVE-2024-51534 | Dell | Path Traversal vulnerability in Dell Data Domain Operating System Dell PowerProtect DD versions prior to DDOS 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain a path traversal vulnerability. | 7.1 |
2025-01-27 | CVE-2025-24118 | Apple | Unspecified vulnerability in Apple Ipados and Macos The issue was addressed with improved memory handling. | 7.1 |
195 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2025-01-27 | CVE-2025-24153 | Apple | Classic Buffer Overflow vulnerability in Apple Macos A buffer overflow issue was addressed with improved memory handling. | 6.7 |
2025-02-01 | CVE-2024-13341 | Techspawn | SQL Injection vulnerability in Techspawn Multiloca The MultiLoca - WooCommerce Multi Locations Inventory Management plugin for WordPress is vulnerable to SQL Injection via the 'data-id' parameter in all versions up to, and including, 4.1.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 6.5 |
2025-02-01 | CVE-2025-0365 | Artbees | Path Traversal vulnerability in Artbees Jupiter X Core The Jupiter X Core plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.8.7 via the inline SVG feature. | 6.5 |
2025-01-30 | CVE-2025-0570 | Santesoft | Out-of-bounds Write vulnerability in Santesoft Sante Pacs Server Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. | 6.5 |
2025-01-30 | CVE-2025-0571 | Santesoft | Out-of-bounds Write vulnerability in Santesoft Sante Pacs Server Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. | 6.5 |
2025-01-30 | CVE-2024-12821 | Userproplugin | Missing Authorization vulnerability in Userproplugin Media Manager The Media Manager for UserPro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the upm_upload_media() function in all versions up to, and including, 3.12.0. | 6.5 |
2025-01-30 | CVE-2024-12861 | Villatheme | Unspecified vulnerability in Villatheme W2S The W2S – Migrate WooCommerce to Shopify plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.2.1 via the 'viw2s_view_log' AJAX action. | 6.5 |
2025-01-30 | CVE-2024-13596 | Modalsurvey | SQL Injection vulnerability in Modalsurvey Wordpress Survey and Poll The WordPress Survey & Poll – Quiz, Survey and Poll Plugin for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'id' attribute of the 'survey' shortcode in all versions up to, and including, 1.7.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 6.5 |
2025-01-30 | CVE-2024-8494 | Elementor | Unspecified vulnerability in Elementor Website Builder The Elementor Website Builder Pro plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.25.10 via the 'elementor-template' shortcode. | 6.5 |
2025-01-30 | CVE-2024-13758 | Dwbooster | Cross-Site Request Forgery (CSRF) vulnerability in Dwbooster CP Contact Form The CP Contact Form with PayPal plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.52. | 6.5 |
2025-01-28 | CVE-2024-28786 | IBM QRadar SIEM 7.5 transmits sensitive or security-critical data in cleartext in a communication channel that could be obtained by an unauthorized actor using man in the middle techniques. | 6.5 | |
2025-01-27 | CVE-2024-37526 | IBM Watson Query on Cloud Pak for Data (IBM Data Virtualization 1.8, 2.0, 2.1, 2.2, and 3.0.0) could allow an authenticated user to obtain sensitive information from objects published using Watson Query due to an improper data protection mechanism. | 6.5 | |
2025-01-27 | CVE-2024-54478 | Apple | Out-of-bounds Read vulnerability in Apple products An out-of-bounds access issue was addressed with improved bounds checking. | 6.5 |
2025-01-27 | CVE-2024-54497 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 6.5 |
2025-01-27 | CVE-2025-24131 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 6.5 |
2025-01-27 | CVE-2025-24143 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved access restrictions to the file system. | 6.5 |
2025-01-27 | CVE-2025-24158 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 6.5 |
2025-01-27 | CVE-2025-24162 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 6.5 |
2025-01-27 | CVE-2025-0753 | Axiosys | Heap-based Buffer Overflow vulnerability in Axiosys Bento4 A vulnerability classified as critical was found in Axiomatic Bento4 up to 1.6.0. | 6.5 |
2025-01-27 | CVE-2025-0751 | Axiosys | Heap-based Buffer Overflow vulnerability in Axiosys Bento4 A vulnerability classified as critical has been found in Axiomatic Bento4 up to 1.6.0. | 6.5 |
2025-01-31 | CVE-2024-49339 | IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4.0 through 3.2.4.1 is vulnerable to stored cross-site scripting. | 6.4 | |
2025-01-31 | CVE-2024-12037 | The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bf_new_submission_link' shortcode in all versions up to, and including, 2.8.13 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-31 | CVE-2024-13157 | The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Podcast RSS Feed in all versions up to, and including, 5.9.3 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-31 | CVE-2024-13566 | The WP DataTable plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 0.2.6 due to insufficient input sanitization and output escaping. | 6.4 | |
2025-01-31 | CVE-2024-11886 | The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vCitaMeetingScheduler ' shortcode in all versions up to, and including, 2.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-31 | CVE-2025-0507 | The Ticketmeo – Sell Tickets – Event Ticketing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 2.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-31 | CVE-2024-13463 | The SeatReg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'seatreg' shortcode in all versions up to, and including, 1.56.0 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-31 | CVE-2024-13396 | The Frictionless plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'frictionless_form' shortcode[s] in all versions up to, and including, 0.0.23 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-31 | CVE-2024-13397 | The WPRadio – WordPress Radio Streaming Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpradio_player' shortcode in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-31 | CVE-2024-13399 | The Gosign – Posts Slider Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'posts-slider-block' block in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. | 6.4 | |
2025-01-30 | CVE-2024-13380 | The Alex Reservations: Smart Restaurant Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'rr_form' shortcode in all versions up to, and including, 2.0.5 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-30 | CVE-2024-13466 | The Automatically Hierarchic Categories in Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'autocategorymenu' shortcode in all versions up to, and including, 2.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-30 | CVE-2024-12524 | The Clinked Client Portal plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'clinked-login-button' shortcode in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-30 | CVE-2024-12921 | The EthereumICO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ethereum-ico shortcode in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-29 | CVE-2024-13561 | The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's brid_override_yt shortcode in all versions up to, and including, 3.8.3 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-29 | CVE-2025-0353 | The Divi Torque Lite – Best Divi Addon, Extensions, Modules & Social Modules plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. | 6.4 | |
2025-01-29 | CVE-2025-0804 | The ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via link titles in all versions up to, and including, 2.4.1 due to insufficient input sanitization and output escaping. | 6.4 | |
2025-02-01 | CVE-2025-0947 | A vulnerability, which was classified as critical, has been found in itsourcecode Tailoring Management System 1.0. | 6.3 | |
2025-02-01 | CVE-2025-0939 | Dcooperman | Missing Authorization vulnerability in Dcooperman Magicform The MagicForm plugin for WordPress is vulnerable to access and modification of data due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 1.6.2. | 6.3 |
2025-01-28 | CVE-2025-0783 | A vulnerability, which was classified as problematic, was found in pankajindevops scale up to 20241113. | 6.3 | |
2025-01-28 | CVE-2025-0752 | A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. | 6.3 | |
2025-01-27 | CVE-2024-54523 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved bounds checks. | 6.3 |
2025-01-27 | CVE-2025-24115 | Apple | Unspecified vulnerability in Apple Macos A path handling issue was addressed with improved validation. | 6.3 |
2025-01-31 | CVE-2024-49349 | IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4.0 through 3.2.4.1 is vulnerable to stored cross-site scripting. | 6.1 | |
2025-01-31 | CVE-2025-24686 | Metagauss | Cross-site Scripting vulnerability in Metagauss Registrationmagic Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss User Registration Forms RegistrationMagic allows Reflected XSS. | 6.1 |
2025-01-31 | CVE-2025-0470 | The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the title parameter in all versions up to, and including, 1.38.2 due to insufficient input sanitization and output escaping. | 6.1 | |
2025-01-30 | CVE-2024-12177 | Wpmessiah | Cross-site Scripting vulnerability in Wpmessiah AI Image ALT Text Generator for WP The Ai Image Alt Text Generator for WP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. | 6.1 |
2025-01-30 | CVE-2024-12299 | Bowo | Cross-site Scripting vulnerability in Bowo System Dashboard 2.8.7 The System Dashboard plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the Filename parameter in all versions up to, and including, 2.8.15 due to insufficient input sanitization and output escaping. | 6.1 |
2025-01-30 | CVE-2024-12320 | Shoalsummitsolutions | Cross-site Scripting vulnerability in Shoalsummitsolutions Team Rosters The Team Rosters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘tab’ parameter in all versions up to, and including, 4.7 due to insufficient input sanitization and output escaping. | 6.1 |
2025-01-30 | CVE-2024-13705 | Stageshow Project | Cross-site Scripting vulnerability in Stageshow Project Stageshow The StageShow plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 9.8.6. | 6.1 |
2025-01-30 | CVE-2025-0860 | Vruiz | Cross-site Scripting vulnerability in Vruiz Vr-Frases The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via several parameters in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. | 6.1 |
2025-01-30 | CVE-2025-0844 | Needyamin | Cross-site Scripting vulnerability in Needyamin Library Card System 1.0 A vulnerability was found in needyamin Library Card System 1.0. | 6.1 |
2025-01-29 | CVE-2025-0806 | Anisha | Code Injection vulnerability in Anisha JOB Recruitment 1.0 A vulnerability was found in code-projects Job Recruitment 1.0. | 6.1 |
2025-01-28 | CVE-2024-13509 | Westguardsolutions | Cross-site Scripting vulnerability in Westguardsolutions WS Form The WS Form LITE – Drag & Drop Contact Form Builder for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the url parameter in all versions up to, and including, 1.10.13 due to insufficient input sanitization and output escaping. | 6.1 |
2025-01-27 | CVE-2025-24593 | Wisdmlabs | Cross-site Scripting vulnerability in Wisdmlabs Edwiser Bridge Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WisdmLabs Edwiser Bridge allows Reflected XSS. | 6.1 |
2025-01-27 | CVE-2025-24680 | Wpexperts | Cross-site Scripting vulnerability in Wpexperts WP Multi Store Locator 2.4 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in WpMultiStoreLocator WP Multi Store Locator allows Reflected XSS. | 6.1 |
2025-01-27 | CVE-2025-24741 | Logon | Open Redirect vulnerability in Logon KB Support URL Redirection to Untrusted Site ('Open Redirect') vulnerability in KB Support KB Support. | 6.1 |
2025-01-27 | CVE-2025-0721 | Needyamin | Cross-site Scripting vulnerability in Needyamin Image Gallery Management System 1.0 A vulnerability classified as problematic has been found in needyamin image_gallery 1.0. | 6.1 |
2025-01-31 | CVE-2024-13623 | The Order Export for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.24 via the 'uploads' directory. | 5.9 | |
2025-01-30 | CVE-2025-0870 | Axiosys | Heap-based Buffer Overflow vulnerability in Axiosys Bento4 A vulnerability was found in Axiomatic Bento4 up to 1.6.0-641. | 5.9 |
2025-01-27 | CVE-2024-38320 | IBM Storage Protect for Virtual Environments: Data Protection for VMware and Storage Protect Backup-Archive Client 8.1.0.0 through 8.1.23.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 5.9 | |
2025-01-27 | CVE-2024-38325 | IBM Storage Defender 2.0.0 through 2.0.7 on-prem defender-sensor-cmd CLI could allow a remote attacker to obtain sensitive information, caused by sending network requests over an insecure channel. | 5.9 | |
2025-01-31 | CVE-2025-21665 | Linux | Infinite Loop vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: filemap: avoid truncating 64-bit offset to 32 bits On 32-bit kernels, folio_seek_hole_data() was inadvertently truncating a 64-bit value to 32 bits, leading to a possible infinite loop when writing to an xfs filesystem. | 5.5 |
2025-01-31 | CVE-2025-21666 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] Recent reports have shown how we sometimes call vsock_*_has_data() when a vsock socket has been de-assigned from a transport (see attached links), but we shouldn't. Previous commits should have solved the real problems, but we may have more in the future, so to avoid null-ptr-deref, we can return 0 (no space, no data available) but with a warning. This way the code should continue to run in a nearly consistent state and have a warning that allows us to debug future problems. | 5.5 |
2025-01-31 | CVE-2025-21667 | Linux | Infinite Loop vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: iomap: avoid avoid truncating 64-bit offset to 32 bits on 32-bit kernels, iomap_write_delalloc_scan() was inadvertently using a 32-bit position due to folio_next_index() returning an unsigned long. This could lead to an infinite loop when writing to an xfs filesystem. | 5.5 |
2025-01-31 | CVE-2025-21669 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: discard packets if the transport changes If the socket has been de-assigned or assigned to another transport, we must discard any packets received because they are not expected and would cause issues when we access vsk->transport. A possible scenario is described by Hyunwoo Kim in the attached link, where after a first connect() interrupted by a signal, and a second connect() failed, we can find `vsk->transport` at NULL, leading to a NULL pointer dereference. | 5.5 |
2025-01-31 | CVE-2025-21670 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: vsock/bpf: return early if transport is not assigned Some of the core functions can only be called if the transport has been assigned. As Michal reported, a socket might have the transport at NULL, for example after a failed connect(), causing the following trace: BUG: kernel NULL pointer dereference, address: 00000000000000a0 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 12faf8067 P4D 12faf8067 PUD 113670067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 15 UID: 0 PID: 1198 Comm: a.out Not tainted 6.13.0-rc2+ RIP: 0010:vsock_connectible_has_data+0x1f/0x40 Call Trace: vsock_bpf_recvmsg+0xca/0x5e0 sock_recvmsg+0xb9/0xc0 __sys_recvfrom+0xb3/0x130 __x64_sys_recvfrom+0x20/0x30 do_syscall_64+0x93/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e So we need to check the `vsk->transport` in vsock_bpf_recvmsg(), especially for connected sockets (stream/seqpacket) as we already do in __vsock_connectible_recvmsg(). | 5.5 |
2025-01-31 | CVE-2025-21672 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: afs: Fix merge preference rule failure condition syzbot reported a lock held when returning to userspace[1]. | 5.5 |
2025-01-31 | CVE-2025-21673 | Linux | Double Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: smb: client: fix double free of TCP_Server_Info::hostname When shutting down the server in cifs_put_tcp_session(), cifsd thread might be reconnecting to multiple DFS targets before it realizes it should exit the loop, so @server->hostname can't be freed as long as cifsd thread isn't done. | 5.5 |
2025-01-31 | CVE-2025-21674 | Linux | Improper Locking vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel Attempt to enable IPsec packet offload in tunnel mode in debug kernel generates the following kernel panic, which is happening due to two issues: 1. | 5.5 |
2025-01-31 | CVE-2025-21675 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Clear port select structure when fail to create Clear the port select structure on error so no stale values left after definers are destroyed. | 5.5 |
2025-01-31 | CVE-2025-21676 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: fec: handle page_pool_dev_alloc_pages error The fec_enet_update_cbd function calls page_pool_dev_alloc_pages but did not handle the case when it returned NULL. | 5.5 |
2025-01-31 | CVE-2025-21681 | Linux | Infinite Loop vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix lockup on tx to unregistering netdev with carrier Commit in a fixes tag attempted to fix the issue in the following sequence of calls: do_output -> ovs_vport_send -> dev_queue_xmit -> __dev_queue_xmit -> netdev_core_pick_tx -> skb_tx_hash When device is unregistering, the 'dev->real_num_tx_queues' goes to zero and the 'while (unlikely(hash >= qcount))' loop inside the 'skb_tx_hash' becomes infinite, locking up the core forever. But unfortunately, checking just the carrier status is not enough to fix the issue, because some devices may still be in unregistering state while reporting carrier status OK. One example of such device is a net/dummy. | 5.5 |
2025-01-31 | CVE-2025-21682 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: always recalculate features after XDP clearing, fix null-deref Recalculate features when XDP is detached. Before: # ip li set dev eth0 xdp obj xdp_dummy.bpf.o sec xdp # ip li set dev eth0 xdp off # ethtool -k eth0 | grep gro rx-gro-hw: off [requested on] After: # ip li set dev eth0 xdp obj xdp_dummy.bpf.o sec xdp # ip li set dev eth0 xdp off # ethtool -k eth0 | grep gro rx-gro-hw: on The fact that HW-GRO doesn't get re-enabled automatically is just a minor annoyance. | 5.5 |
2025-01-31 | CVE-2025-21683 | Linux | Memory Leak vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: Fix bpf_sk_select_reuseport() memory leak As pointed out in the original comment, lookup in sockmap can return a TCP ESTABLISHED socket. | 5.5 |
2025-01-27 | CVE-2024-54507 | Apple | Type Confusion vulnerability in Apple Ipados A type confusion issue was addressed with improved memory handling. | 5.5 |
2025-01-27 | CVE-2024-54519 | Apple | Information Exposure Through Log Files vulnerability in Apple Macos The issue was resolved by sanitizing logging. | 5.5 |
2025-01-27 | CVE-2024-54520 | Apple | Path Traversal vulnerability in Apple Macos A path handling issue was addressed with improved validation. | 5.5 |
2025-01-27 | CVE-2024-54536 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved validation of environment variables. | 5.5 |
2025-01-27 | CVE-2024-54541 | Apple | Unspecified vulnerability in Apple products This issue was addressed through improved state management. | 5.5 |
2025-01-27 | CVE-2024-54549 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed with improved redaction of sensitive information. | 5.5 |
2025-01-27 | CVE-2025-24086 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 5.5 |
2025-01-27 | CVE-2025-24087 | Apple | Improper Preservation of Permissions vulnerability in Apple Macos The issue was addressed with additional permissions checks. | 5.5 |
2025-01-27 | CVE-2025-24096 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed through improved state management. | 5.5 |
2025-01-27 | CVE-2025-24101 | Apple | Insecure Storage of Sensitive Information vulnerability in Apple Macos This issue was addressed with improved redaction of sensitive information. | 5.5 |
2025-01-27 | CVE-2025-24103 | Apple | Link Following vulnerability in Apple Macos This issue was addressed with improved validation of symlinks. | 5.5 |
2025-01-27 | CVE-2025-24104 | Apple | Link Following vulnerability in Apple Iphone OS This issue was addressed with improved handling of symlinks. | 5.5 |
2025-01-27 | CVE-2025-24106 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2025-01-27 | CVE-2025-24108 | Apple | Unspecified vulnerability in Apple Macos An access issue was addressed with additional sandbox restrictions. | 5.5 |
2025-01-27 | CVE-2025-24109 | Apple | Unspecified vulnerability in Apple Macos A downgrade issue was addressed with additional code-signing restrictions. | 5.5 |
2025-01-27 | CVE-2025-24112 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2025-01-27 | CVE-2025-24114 | Apple | Unspecified vulnerability in Apple Macos A permissions issue was addressed with additional restrictions. | 5.5 |
2025-01-27 | CVE-2025-24117 | Apple | Insecure Storage of Sensitive Information vulnerability in Apple products This issue was addressed with improved redaction of sensitive information. | 5.5 |
2025-01-27 | CVE-2025-24122 | Apple | Unspecified vulnerability in Apple Macos A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. | 5.5 |
2025-01-27 | CVE-2025-24123 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 5.5 |
2025-01-27 | CVE-2025-24124 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 5.5 |
2025-01-27 | CVE-2025-24127 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 5.5 |
2025-01-27 | CVE-2025-24130 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2025-01-27 | CVE-2025-24134 | Apple | Unspecified vulnerability in Apple Macos An information disclosure issue was addressed with improved privacy controls. | 5.5 |
2025-01-27 | CVE-2025-24138 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed through improved state management. | 5.5 |
2025-01-27 | CVE-2025-24139 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved checks. | 5.5 |
2025-01-27 | CVE-2025-24149 | Apple | Out-of-bounds Read vulnerability in Apple products An out-of-bounds read was addressed with improved bounds checking. | 5.5 |
2025-01-27 | CVE-2025-24151 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved memory handling. | 5.5 |
2025-01-27 | CVE-2025-24152 | Apple | Unspecified vulnerability in Apple Macos The issue was addressed with improved memory handling. | 5.5 |
2025-01-27 | CVE-2025-24161 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 5.5 |
2025-01-27 | CVE-2025-24163 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved checks. | 5.5 |
2025-02-01 | CVE-2024-13612 | Wordplus | Cross-site Scripting vulnerability in Wordplus Better Messages The Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'better_messages_live_chat_button' shortcode in all versions up to, and including, 2.6.9 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-02-01 | CVE-2024-13775 | Vanquish | Missing Authorization vulnerability in Vanquish Woocommerce Support Ticket System The WooCommerce Support Ticket System plugin for WordPress is vulnerable to unauthorized access and loss of data due to missing capability checks on the 'ajax_delete_message', 'ajax_get_customers_partial_list', and 'ajax_get_admins_list' functions in all versions up to, and including, 17.8. | 5.4 |
2025-02-01 | CVE-2024-12825 | Brechtvds | Missing Authorization vulnerability in Brechtvds Custom Related Posts The Custom Related Posts plugin for WordPress is vulnerable to unauthorized access & modification of data due to a missing capability check on three AJAX actions in all versions up to, and including, 1.7.3. | 5.4 |
2025-02-01 | CVE-2024-11829 | Posimyth | Cross-site Scripting vulnerability in Posimyth the Plus Addons for Elementor The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Table Widget's searchable_label parameter in all versions up to, and including, 6.1.8 due to insufficient input sanitization and output escaping. | 5.4 |
2025-02-01 | CVE-2024-11780 | Sitesearch360 | Cross-site Scripting vulnerability in Sitesearch360 Site Search 360 The Site Search 360 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ss360-resultblock' shortcode in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-02-01 | CVE-2024-13547 | Athemes | Cross-site Scripting vulnerability in Athemes Addons for Elementor The aThemes Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Accordion widget in all versions up to, and including, 1.0.12 due to insufficient input sanitization and output escaping. | 5.4 |
2025-01-31 | CVE-2024-40696 | IBM | Cross-site Scripting vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to cross-site scripting. | 5.4 |
2025-01-31 | CVE-2024-47103 | IBM | Cross-site Scripting vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to cross-site scripting. | 5.4 |
2025-01-31 | CVE-2024-47116 | IBM | Cross-site Scripting vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to cross-site scripting. | 5.4 |
2025-01-31 | CVE-2024-49807 | IBM | Cross-site Scripting vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to stored cross-site scripting. | 5.4 |
2025-01-31 | CVE-2025-22757 | Codebard | Cross-site Scripting vulnerability in Codebard Help Desk Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard CodeBard Help Desk allows Stored XSS. | 5.4 |
2025-01-31 | CVE-2024-12772 | Wpmanageninja | Cross-site Scripting vulnerability in Wpmanageninja Ninja Tables The Ninja Tables WordPress plugin before 5.0.17 does not sanitize and escape a parameter before outputting it back in the page when importing a CSV, leading to a Cross Site Scripting vulnerability. | 5.4 |
2025-01-31 | CVE-2024-10867 | Visualmodo | Cross-site Scripting vulnerability in Visualmodo Borderless The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.5.9 due to insufficient input sanitization and output escaping. | 5.4 |
2025-01-30 | CVE-2024-10847 | Sellerthemes | Cross-site Scripting vulnerability in Sellerthemes Storely The Storely theme for WordPress is vulnerable to Stored Cross-Site Scripting via a malicious display name in all versions up to, and including, 16.6 due to insufficient input sanitization and output escaping. | 5.4 |
2025-01-30 | CVE-2024-12444 | Wpdispensary | Cross-site Scripting vulnerability in Wpdispensary WP Dispensary The WP Dispensary plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpd_menu' shortcode in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-30 | CVE-2024-12451 | Proxymis | Cross-site Scripting vulnerability in Proxymis Html5 Chat The HTML5 chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'HTML5CHAT' shortcode in all versions up to, and including, 1.04 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-30 | CVE-2024-13349 | Stockdio | Cross-site Scripting vulnerability in Stockdio Historical Chart The Stockdio Historical Chart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'stockdio-historical-chart' shortcode in all versions up to, and including, 2.8.18 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-30 | CVE-2024-13400 | Gubbigubbi | Cross-site Scripting vulnerability in Gubbigubbi Kona Gallery Block The Kona Gallery Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the "Kona: Instagram for Gutenberg" Block, specifically in the "align" attribute, in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. | 5.4 |
2025-01-30 | CVE-2024-13460 | Wordpresteem | Cross-site Scripting vulnerability in Wordpresteem WE - Testimonial Slide The WE – Testimonial Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Testimonial Author Names in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping. | 5.4 |
2025-01-30 | CVE-2024-13512 | Wonderjarcreative | Cross-Site Request Forgery (CSRF) vulnerability in Wonderjarcreative Wonder Fontawesome The Wonder FontAwesome plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.8. | 5.4 |
2025-01-30 | CVE-2024-13549 | Areoi | Cross-site Scripting vulnerability in Areoi ALL Bootstrap Blocks The All Bootstrap Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the "Accordion" widget in all versions up to, and including, 1.3.26 due to insufficient input sanitization and output escaping. | 5.4 |
2025-01-30 | CVE-2024-13661 | Wptableeditor | Cross-site Scripting vulnerability in Wptableeditor Table Editor The Table Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wptableeditor_vtabs' shortcode in all versions up to, and including, 1.5.1 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-30 | CVE-2024-13664 | Wpbean | Cross-site Scripting vulnerability in Wpbean WP Post List Table The WP Post List Table plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpb_post_list_table' shortcode in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-30 | CVE-2024-13670 | Partitionnumerique | Cross-site Scripting vulnerability in Partitionnumerique Music Sheet Viewer The Music Sheet Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pn_msv' shortcode in all versions up to, and including, 4.1 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-30 | CVE-2024-13700 | Vinayjain | Cross-site Scripting vulnerability in Vinayjain Embed Swagger UI The Embed Swagger UI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpsgui' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-30 | CVE-2024-13732 | Cyberchimps | Cross-site Scripting vulnerability in Cyberchimps Responsive Blocks The Responsive Blocks – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘section_tag’ parameter in all versions up to, and including, 1.9.9 due to insufficient input sanitization and output escaping. | 5.4 |
2025-01-30 | CVE-2024-13470 | Ninjaforms | Cross-site Scripting vulnerability in Ninjaforms Ninja Forms The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode in all versions up to, and including, 3.8.24 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-30 | CVE-2024-13642 | Motopress | Cross-site Scripting vulnerability in Motopress Stratum The Stratum – Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Hotspot widget in all versions up to, and including, 1.4.7 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-28 | CVE-2025-23055 | Arubanetworks | Unspecified vulnerability in Arubanetworks Fabric Composer A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. | 5.4 |
2025-01-28 | CVE-2025-23056 | Arubanetworks | Unspecified vulnerability in Arubanetworks Fabric Composer A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. | 5.4 |
2025-01-28 | CVE-2025-23057 | Arubanetworks | Unspecified vulnerability in Arubanetworks Fabric Composer A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. | 5.4 |
2025-01-28 | CVE-2024-13527 | Philantro | Cross-site Scripting vulnerability in Philantro The Philantro – Donations and Donor Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes like 'donate' in all versions up to, and including, 5.3 due to insufficient input sanitization and output escaping on user supplied attributes. | 5.4 |
2025-01-28 | CVE-2024-13521 | Ilghera | Cross-Site Request Forgery (CSRF) vulnerability in Ilghera Mailup Auto Subscription The MailUp Auto Subscription plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.0. | 5.4 |
2025-01-28 | CVE-2025-0321 | Wpmet | Cross-site Scripting vulnerability in Wpmet Elementskit The ElementsKit Pro plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.7.8 due to insufficient input sanitization and output escaping. | 5.4 |
2025-01-27 | CVE-2023-52292 | IBM | Cross-site Scripting vulnerability in IBM Sterling File Gateway IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 is vulnerable to stored cross-site scripting. | 5.4 |
2025-01-27 | CVE-2024-37527 | IBM | Cross-site Scripting vulnerability in IBM Openpages With Watson 9.0 IBM OpenPages with Watson 8.3 and 9.0 is vulnerable to cross-site scripting. | 5.4 |
2025-01-27 | CVE-2023-46187 | IBM InfoSphere Master Data Management 11.6, 12.0, and 14.0 is vulnerable to stored cross-site scripting. | 5.4 | |
2025-02-01 | CVE-2024-13371 | Wpjobportal | Missing Authorization vulnerability in Wpjobportal WP JOB Portal The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to unauthorized arbitrary emails sending due to a missing capability check on the sendEmailToJobSeeker() function in all versions up to, and including, 2.2.6. | 5.3 |
2025-02-01 | CVE-2024-13372 | Wpjobportal | Authorization Bypass Through User-Controlled Key vulnerability in Wpjobportal WP JOB Portal The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the getresumefiledownloadbyid() and getallresumefiles() functions due to missing validation on a user controlled key. | 5.3 |
2025-02-01 | CVE-2024-13428 | Wpjobportal | Authorization Bypass Through User-Controlled Key vulnerability in Wpjobportal WP JOB Portal The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the deleteCompanyLogo() due to missing validation on a user controlled key. | 5.3 |
2025-02-01 | CVE-2024-12041 | Wpwax | Unspecified vulnerability in Wpwax Directorist The Directorist: AI-Powered WordPress Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 8.0.12 via the /wp-json/directorist/v1/users/ endpoint. | 5.3 |
2025-02-01 | CVE-2024-12184 | Cimatti | Missing Authorization vulnerability in Cimatti Wordpress Contact Forms The WordPress Contact Forms by Cimatti plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the accua_forms_download_submitted_file() function in all versions up to, and including, 1.9.4. | 5.3 |
2025-02-01 | CVE-2024-12620 | Creativeinteractivemedia | Missing Authorization vulnerability in Creativeinteractivemedia Animategl Animations The AnimateGL Animations for WordPress – Elementor & Gutenberg Blocks Animations plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'agl_json' AJAX action in all versions up to, and including, 1.4.23. | 5.3 |
2025-01-31 | CVE-2024-12267 | The Drag and Drop Multiple File Upload – Contact Form 7 plugin for WordPress is vulnerable to limited arbitrary file deletion due to insufficient file path validation in the dnd_codedropz_upload_delete() function in all versions up to, and including, 1.3.8.5. | 5.3 | |
2025-01-30 | CVE-2025-0573 | Santesoft | Path Traversal vulnerability in Santesoft Sante Pacs Server Sante PACS Server DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. | 5.3 |
2025-01-30 | CVE-2024-13457 | Liquidweb | Authorization Bypass Through User-Controlled Key vulnerability in Liquidweb Event Tickets The Event Tickets and Registration plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.18.1 via the tc-order-id parameter due to missing validation on a user controlled key. | 5.3 |
2025-01-29 | CVE-2023-37413 | IBM | Response Discrepancy Information Exposure vulnerability in IBM Aspera Faspex IBM Aspera Faspex 5.0.0 through 5.0.10 could disclose sensitive username information due to an observable response discrepancy. | 5.3 |
2025-01-28 | CVE-2024-27263 | IBM | Man-in-the-Middle vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 could allow an authenticated user to obtain sensitive information from the dashboard UI using man in the middle techniques. | 5.3 |
2025-01-27 | CVE-2024-54488 | Apple | Unspecified vulnerability in Apple Iphone OS A logic issue was addressed with improved file handling. | 5.3 |
2025-01-27 | CVE-2024-54518 | Apple | Out-of-bounds Read vulnerability in Apple products The issue was addressed with improved bounds checks. | 5.3 |
2025-01-27 | CVE-2025-24140 | Apple | Unspecified vulnerability in Apple Macos This issue was addressed through improved state management. | 5.3 |
2025-02-01 | CVE-2024-53296 | Dell | Out-of-bounds Write vulnerability in Dell Data Domain Operating System Dell PowerProtect DD versions prior to 7.10.1.50 and 7.13.1.20 contain a Stack-based Buffer Overflow vulnerability in the RestAPI. | 4.9 |
2025-01-30 | CVE-2025-23374 | Dell | Information Exposure Through Log Files vulnerability in Dell Enterprise Sonic Distribution Dell Networking Switches running Enterprise SONiC OS, version(s) prior to 4.4.1 and 4.2.3, contain(s) an Insertion of Sensitive Information into Log File vulnerability. | 4.9 |
2025-01-29 | CVE-2023-37412 | IBM | Execution with Unnecessary Privileges vulnerability in IBM Aspera Faspex IBM Aspera Faspex 5.0.0 through 5.0.10 could allow a privileged user to make system changes without proper access controls. | 4.9 |
2025-01-29 | CVE-2023-33838 | IBM | Use of a One-Way Hash without a Salt vulnerability in IBM Security Verify Governance 10.0.2 IBM Security Verify Governance 10.0.2 Identity Manager uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the product does not also use a salt as part of the input. | 4.9 |
2025-01-27 | CVE-2024-45598 | Cacti | Path Traversal vulnerability in Cacti Cacti is an open source performance and fault management framework. | 4.9 |
2025-01-29 | CVE-2025-0800 | Argie | Cross-site Scripting vulnerability in Argie Online Courseware 1.0 A vulnerability classified as problematic has been found in SourceCodester Online Courseware 1.0. | 4.8 |
2025-01-27 | CVE-2024-28770 | IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 does not set the secure attribute on authorization tokens or session cookies. | 4.8 | |
2025-01-27 | CVE-2024-28771 | IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 does not set the secure attribute on authorization tokens or session cookies. | 4.8 | |
2025-01-28 | CVE-2024-11956 | A vulnerability, which was classified as critical, has been found in Pimcore customer-data-framework up to 4.2.0. | 4.7 | |
2025-01-27 | CVE-2025-24094 | Apple | Race Condition vulnerability in Apple Macos A race condition was addressed with additional validation. | 4.7 |
2025-01-27 | CVE-2025-0734 | A vulnerability has been found in y_project RuoYi up to 4.8.0 and classified as critical. | 4.7 | |
2025-01-27 | CVE-2025-0732 | A vulnerability, which was classified as problematic, has been found in Discord up to 1.0.9177 on Windows. | 4.5 | |
2025-01-27 | CVE-2025-0733 | A vulnerability, which was classified as problematic, was found in Postman up to 11.20 on Windows. | 4.5 | |
2025-01-27 | CVE-2025-24116 | Apple | Unspecified vulnerability in Apple Macos An access issue was addressed with additional sandbox restrictions. | 4.4 |
2025-01-27 | CVE-2025-24136 | Apple | Link Following vulnerability in Apple Macos This issue was addressed with improved validation of symlinks. | 4.4 |
2025-01-27 | CVE-2024-12345 | A vulnerability classified as problematic was found in INW Krbyyyzo 25.2002. | 4.4 | |
2025-02-02 | CVE-2025-0970 | A vulnerability was found in Zenvia Movidesk up to 25.01.22. | 4.3 | |
2025-02-01 | CVE-2024-13425 | Wpjobportal | Authorization Bypass Through User-Controlled Key vulnerability in Wpjobportal WP JOB Portal The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the enforcedelete() function due to missing validation on a user controlled key. | 4.3 |
2025-02-01 | CVE-2024-13429 | Wpjobportal | Authorization Bypass Through User-Controlled Key vulnerability in Wpjobportal WP JOB Portal The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the 'jobenforcedelete' due to missing validation on a user controlled key. | 4.3 |
2025-02-01 | CVE-2024-13651 | Rapidload | Missing Authorization vulnerability in Rapidload Power-Up for Autoptimize The RapidLoad – Optimize Web Vitals Automatically plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_deactivate() function in all versions up to, and including, 2.4.4. | 4.3 |
2025-01-31 | CVE-2024-45089 | IBM | Information Exposure Through Discrepancy vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition EBICS server could allow an authenticated user to obtain sensitive filename information due to an observable discrepancy. | 4.3 |
2025-01-31 | CVE-2024-13530 | The Custom Login Page Styler – Limit Login Attempts – Restrict Content With Login – Redirect After Login – Change Login URL – Sign in , Sign out plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the lps_handle_delete_all_logs(), lps_handle_delete_login_log(), and lps_handle_end_session() functions in all versions up to, and including, 7.1.1. | 4.3 | |
2025-01-31 | CVE-2024-13216 | The HT Event – WordPress Event Manager Plugin for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.7 via the 'render' function in /includes/widgets/htevent_sponsor.php. | 4.3 | |
2025-01-31 | CVE-2024-13415 | The Food Menu – Restaurant Menu & Online Ordering for WooCommerce plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the response() function in all versions up to, and including, 5.1.4. | 4.3 | |
2025-01-31 | CVE-2024-13424 | The Ni Sales Commission For WooCommerce plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'niwoosc_ajax' AJAX endpoint in all versions up to, and including, 1.2.4. | 4.3 | |
2025-01-31 | CVE-2024-13717 | The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vcita_ajax_toggle_ae and vcita_ajax_toggle_contact functions in all versions up to, and including, 2.7.1. | 4.3 | |
2025-01-30 | CVE-2025-0572 | Santesoft | Path Traversal vulnerability in Santesoft Sante Pacs Server Sante PACS Server Web Portal DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. | 4.3 |
2025-01-30 | CVE-2024-11583 | Visualmodo | Missing Authorization vulnerability in Visualmodo Borderless The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'remove_zipped_font' function in all versions up to, and including, 1.5.9. | 4.3 |
2025-01-30 | CVE-2024-12102 | Seventhqueen | Unspecified vulnerability in Seventhqueen Typer Core The Typer Core plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.6 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. | 4.3 |
2025-01-30 | CVE-2024-13652 | Ecpay | Missing Authorization vulnerability in Ecpay Ecommerce for Woocommerce The ECPay Ecommerce for WooCommerce plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'clear_ecpay_debug_log' AJAX action in all versions up to, and including, 1.1.2411060. | 4.3 |
2025-01-30 | CVE-2024-13715 | Ikjweb | Missing Authorization vulnerability in Ikjweb Zstore Manager Basic The zStore Manager Basic plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the zstore_clear_cache() function in all versions up to, and including, 3.311. | 4.3 |
2025-01-28 | CVE-2025-0754 | The vulnerability was found in OpenShift Service Mesh 2.6.3 and 2.5.6. | 4.3 | |
2025-01-27 | CVE-2025-24113 | Apple | Unspecified vulnerability in Apple products The issue was addressed with improved UI. | 4.3 |
2025-01-27 | CVE-2025-24128 | Apple | Unspecified vulnerability in Apple products The issue was addressed by adding additional logic. | 4.3 |
2025-01-27 | CVE-2025-0729 | A vulnerability was found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. | 4.3 | |
2025-01-27 | CVE-2023-47159 | IBM | Response Discrepancy Information Exposure vulnerability in IBM Sterling File Gateway IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 could allow an authenticated user to enumerate usernames due to an observable discrepancy in request responses. | 4.3 |
2025-01-27 | CVE-2024-22316 | IBM | Improper Access Control vulnerability in IBM Sterling File Gateway IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 could allow an authenticated user to perform unauthorized actions to another user's data due to improper access controls. | 4.3 |
2025-01-28 | CVE-2024-22315 | IBM Fusion and IBM Fusion HCI 2.3.0 through 2.8.2 is vulnerable to insecure network connection by allowing an attacker who gains access to a Fusion container to establish an external network connection. | 4.0 |