Search Results (323538 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-12073 1 Meteor Slides Project 1 Meteor Slides 2025-06-05 6.4 Medium
The Meteor Slides plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'slide_url_value' parameter in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2024-12290 1 Infility 1 Infility Global 2025-06-05 6.1 Medium
The Infility Global plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘set_type’ parameter in all versions up to, and including, 2.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CVE-2024-11496 1 Infility 1 Infility Global 2025-06-05 6.5 Medium
The Infility Global plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the infility_global_ajax function in all versions up to, and including, 2.9.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update plugin options and potentially break the site.
CVE-2024-47150 1 Honor 1 Magicos 2025-06-05 3.3 Low
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
CVE-2024-47149 1 Honor 1 Magicos 2025-06-05 3.3 Low
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.
CVE-2024-12545 1 Appsmav 1 Scratch \& Win 2025-06-05 5.4 Medium
The Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.1. This is due to missing nonce validation on the reset_installation() function. This makes it possible for unauthenticated attackers to reset the plugin’s installation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2024-47151 1 Honor 1 Magicos 2025-06-05 6.3 Medium
Some Honor products are affected by file writing vulnerability, successful exploitation could cause code execution
CVE-2024-35421 2 Lonelycoder, Vmir 2 Vmir, Vmir 2025-06-05 5.5 Medium
vmir e8117 was discovered to contain a segmentation violation via the wasm_parse_block function at /src/vmir_wasm_parser.c.
CVE-2024-35422 2 Lonelycoder, Vmir 2 Vmir, Vmir 2025-06-05 7.8 High
vmir e8117 was discovered to contain a heap buffer overflow via the wasm_call function at /src/vmir_wasm_parser.c.
CVE-2024-35423 2 Lonelycoder, Vmir 2 Vmir, Vmir 2025-06-05 7.8 High
vmir e8117 was discovered to contain a heap buffer overflow via the wasm_parse_section_functions function at /src/vmir_wasm_parser.c.
CVE-2024-35424 2 Lonelycoder, Vmir 2 Vmir, Vmir 2025-06-05 5.5 Medium
vmir e8117 was discovered to contain a segmentation violation via the import_function function at /src/vmir_wasm_parser.c.
CVE-2024-35425 2 Lonelycoder, Vmir 2 Vmir, Vmir 2025-06-05 5.5 Medium
vmir e8117 was discovered to contain a segmentation violation via the function_prepare_parse function at /src/vmir_function.c.
CVE-2024-35426 2 Lonelycoder, Vmir 2 Vmir, Vmir 2025-06-05 9.8 Critical
vmir e8117 was discovered to contain a stack overflow via the init_local_vars function at /src/vmir_wasm_parser.c.
CVE-2024-35427 2 Lonelycoder, Vmir 2 Vmir, Vmir 2025-06-05 5.5 Medium
vmir e8117 was discovered to contain a segmentation violation via the export_function function at /src/vmir_wasm_parser.c.
CVE-2023-34990 1 Fortinet 1 Fortiwlm 2025-06-05 9.6 Critical
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.
CVE-2024-12032 1 Themefic 1 Tourfic 2025-06-05 6.5 Medium
The Tourfic – Ultimate Hotel Booking, Travel Booking & Apartment Booking WordPress Plugin | WooCommerce Booking plugin for WordPress is vulnerable to SQL Injection via the 'enquiry_id' parameter of the 'tf_enquiry_reply_email_callback' function in all versions up to, and including, 2.15.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CVE-2024-11722 1 Dynamiapps 1 Frontend Admin 2025-06-05 5.9 Medium
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 3.25.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This requires an unauthenticated user to have been given permission to view form submissions, and the form submission shortcode be added to a page.
CVE-2024-5409 1 Saltos 1 Rhinos 2025-06-05 7.1 High
RhinOS 3.0-1190 is vulnerable to an XSS via the "tamper" parameter in /admin/lib/phpthumb/phpthumb.php. An attacker could create a malicious URL and send it to a victim to obtain their session details.
CVE-2024-5408 1 Saltos 1 Rhinos 2025-06-05 7.1 High
Vulnerability in RhinOS 3.0-1190 consisting of an XSS through the "search" parameter of /portal/search.htm. This vulnerability could allow a remote attacker to steal details of a victim's user session by submitting a specially crafted URL.
CVE-2024-12061 1 Nicheaddons 1 Events Addon For Elementor 2025-06-05 4.3 Medium
The Events Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2.3 via the naevents_elementor_template shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.