CVE Alert: CVE-2024-45600
Vulnerability Summary: CVE-2024-45600 Fields is a GLPI plugin that allows users to add custom fields on GLPI items forms. Prior...
Vulnerability Summary: CVE-2024-45600 Fields is a GLPI plugin that allows users to add custom fields on GLPI items forms. Prior...
Vulnerability Summary: CVE-2024-12968 A vulnerability classified as critical was found in code-projects Job Recruitment 1.0. Affected by this vulnerability is...
Vulnerability Summary: CVE-2024-12969 A vulnerability, which was classified as critical, has been found in code-projects Hospital Management System 1.0. Affected...
Vulnerability Summary: CVE-2024-53850 The Addressing GLPI plugin enables you to create IP reports for visualize IP addresses used and free...
Vulnerability Summary: CVE-2024-12413 The MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to unauthorized access due...
Vulnerability Summary: CVE-2024-12032 The Tourfic – Ultimate Hotel Booking, Travel Booking & Apartment Booking WordPress Plugin | WooCommerce Booking plugin...
Vulnerability Summary: CVE-2024-12335 The Avada (Fusion) Builder plugin for WordPress is vulnerable to Information Exposure in all versions up to,...
Vulnerability Summary: CVE-2024-12428 The WP Data Access – App, Table, Form and Chart Builder plugin plugin for WordPress is vulnerable...
Vulnerability Summary: CVE-2024-12190 The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom...
Vulnerability Summary: CVE-2024-12636 The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages plugin for WordPress...
Vulnerability Summary: CVE-2024-12272 The WP Travel Engine – Elementor Widgets | Create Travel Booking Website Using WordPress and Elementor plugin...
Vulnerability Summary: CVE-2024-39725 IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3 could allow a remote attacker to obtain...
Vulnerability Summary: CVE-2024-39727 IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3 uses a web link with untrusted references...
Vulnerability Summary: CVE-2024-8950 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Arne Informatics Piramit...
Vulnerability Summary: CVE-2024-11281 The WooCommerce Point of Sale plugin for WordPress is vulnerable to privilege escalation in all versions up...
Vulnerability Summary: CVE-2024-10862 The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable...
Vulnerability Summary: CVE-2024-47102 IBM AIX 7.2, 7.3, VIOS 3.1, and 4.1 could allow a non-privileged local user to exploit a...
Vulnerability Summary: CVE-2024-47978 Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local...
Vulnerability Summary: CVE-2023-5117 An issue was discovered in GitLab CE/EE affecting all versions before 17.6.0 in which users were unaware...
Vulnerability Summary: CVE-2024-53291 Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Exposure of Sensitive Information Through Metadata vulnerability. An unauthenticated attacker with...
Vulnerability Summary: CVE-2024-52906 IBM AIX 7.2, 7.3, VIOS 3.1, and 4.1 could allow a non-privileged local user to exploit a...
Vulnerability Summary: CVE-2024-52535 Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0...
Vulnerability Summary: CVE-2024-52543 Dell NativeEdge, version(s) 2.1.0.0, contain(s) a Creation of Temporary File With Insecure Permissions vulnerability. A high privileged...
Vulnerability Summary: CVE-2024-52534 Dell ECS, version(s) prior to ECS 3.8.1.3, contain(s) an Authentication Bypass by Capture-replay vulnerability. A low privileged...