Total
3276 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-32828 | 2024-08-02 | 4.3 Medium | ||
Missing Authorization vulnerability in Octolize Flexible Shipping.This issue affects Flexible Shipping: from n/a through 4.24.15. | ||||
CVE-2024-32829 | 2024-08-02 | 4.3 Medium | ||
Missing Authorization vulnerability in Supsystic Data Tables Generator by Supsystic.This issue affects Data Tables Generator by Supsystic: from n/a through 1.10.31. | ||||
CVE-2024-32826 | 2024-08-02 | 5.3 Medium | ||
Missing Authorization vulnerability in Vektor,Inc. VK Block Patterns.This issue affects VK Block Patterns: from n/a through 1.31.0. | ||||
CVE-2024-32818 | 2024-08-02 | 4.3 Medium | ||
Missing Authorization vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF).This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3. | ||||
CVE-2024-32824 | 2024-08-02 | 5.4 Medium | ||
Missing Authorization vulnerability in Evergreen Content Poster.This issue affects Evergreen Content Poster: from n/a through 1.4.2. | ||||
CVE-2024-32822 | 1 Wordpress | 1 Reviews Plus | 2024-08-02 | 4.3 Medium |
Missing Authorization vulnerability in impleCode Reviews Plus.This issue affects Reviews Plus: from n/a through 1.3.4. | ||||
CVE-2024-32820 | 1 Socialshare | 1 Social Share Icons \& Social Share Buttons | 2024-08-02 | 5.3 Medium |
Missing Authorization vulnerability in Social Share Pro Social Share Icons & Social Share Buttons.This issue affects Social Share Icons & Social Share Buttons: from n/a through 3.6.2. | ||||
CVE-2024-32792 | 2024-08-02 | 4.3 Medium | ||
Missing Authorization vulnerability in WPMU DEV Hummingbird.This issue affects Hummingbird: from n/a through 3.7.3. | ||||
CVE-2024-32810 | 1 Shortpixel | 1 Shortpixel Critical Css | 2024-08-02 | 7.6 High |
Missing Authorization vulnerability in ShortPixel ShortPixel Critical CSS.This issue affects ShortPixel Critical CSS: from n/a through 1.0.2. | ||||
CVE-2024-32784 | 2024-08-02 | 4.3 Medium | ||
Missing Authorization vulnerability in CookieHub.This issue affects CookieHub: from n/a through 1.1.0. | ||||
CVE-2024-32799 | 1 Realestateconnected | 1 Easy Property Listings | 2024-08-02 | 5.3 Medium |
Missing Authorization vulnerability in Merv Barrett Easy Property Listings.This issue affects Easy Property Listings: from n/a through 3.5.3. | ||||
CVE-2024-32802 | 2024-08-02 | 5.3 Medium | ||
Missing Authorization vulnerability in WordPlus BP Better Messages allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects BP Better Messages: from n/a through 2.4.32. | ||||
CVE-2024-32798 | 1 Wptravelengine | 1 Wp Travel Engine | 2024-08-02 | 7.5 High |
Missing Authorization vulnerability in WP Travel Engine.This issue affects WP Travel Engine: from n/a through 5.8.0. | ||||
CVE-2024-32797 | 2024-08-02 | 5.4 Medium | ||
Missing Authorization vulnerability in Martin Gibson WP LinkedIn Auto Publish.This issue affects WP LinkedIn Auto Publish: from n/a through 8.11. | ||||
CVE-2024-32804 | 2024-08-02 | 4.3 Medium | ||
Missing Authorization vulnerability in Martin Gibson WP GoToWebinar.This issue affects WP GoToWebinar: from n/a through 14.46. | ||||
CVE-2024-32813 | 2024-08-02 | 5.3 Medium | ||
Missing Authorization vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.9. | ||||
CVE-2024-32779 | 2024-08-02 | 5.3 Medium | ||
Missing Authorization vulnerability in Avirtum Vision Interactive.This issue affects Vision Interactive: from n/a through 1.7.1. | ||||
CVE-2024-32777 | 2024-08-02 | 7.5 High | ||
Missing Authorization vulnerability in BizSwoop a CPF Concepts, LLC Brand BizPrint.This issue affects BizPrint: from n/a through 4.3.39. | ||||
CVE-2024-32805 | 1 Social Snap | 1 Social Snap | 2024-08-02 | 6.5 Medium |
Missing Authorization vulnerability in Social Snap.This issue affects Social Snap: from n/a through 1.3.5. | ||||
CVE-2024-32731 | 2024-08-02 | 5.5 Medium | ||
SAP My Travel Requests does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, the attacker can upload a malicious attachment to a business trip request which will lead to a low impact on the confidentiality, integrity and availability of the application. |