Threat Intelligence Feed
Real-Time Cyber Threat Data
Vulnerability intelligence, CVE tracking, and threat actor analysis — powered by OpenCTI and curated for cyber insurance professionals.
Last updated: May 6, 2026
🔍 CVE-2023-34992: A improper neutralization of special elements used in an os command ('os command
CVE CVE-2023-34992 with CVSS 10. A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet allows attacker to execute unauthorized code or commands via crafted API requests.
🔍 CVE-2023-34976: A SQL injection vulnerability has been reported to affect Video Station. If expl
CVE CVE-2023-34976 with CVSS 10. A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.0 ( 2023/07/27 ) and later
🔍 CVE-2023-25960: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-25960 with CVSS 10. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zendrop Zendrop – Global Dropshipping zendrop-dropshipping-and-fulfillment allows SQL Injection.This issue affects Zendrop – Global Dropshipping: from n/a through 1.0.0.
🔍 CVE-2023-4994: The Allow PHP in Posts and Pages plugin for WordPress is vulnerable to Remote Co
CVE CVE-2023-4994 with CVSS 9.9. The Allow PHP in Posts and Pages plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 3.0.4 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server.
🔍 CVE-2023-5201: The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in vers
CVE CVE-2023-5201 with CVSS 9.9. The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be ena
🔍 CVE-2023-5199: The PHP to Page plugin for WordPress is vulnerable Local File Inclusion to Remot
CVE CVE-2023-5199 with CVSS 9.9. The PHP to Page plugin for WordPress is vulnerable Local File Inclusion to Remote Code Execution in versions up to, and including, 0.3 via the 'php-to-page' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to include local file and potentially execute code o
🔍 CVE-2023-36529: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-36529 with CVSS 9.9. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Favethemes Houzez - Real Estate WordPress Theme allows SQL Injection.This issue affects Houzez - Real Estate WordPress Theme: from n/a through 1.3.4.
🔍 CVE-2023-4634: The Media Library Assistant plugin for WordPress is vulnerable to Local File Inc
CVE CVE-2023-4634 with CVSS 9.8. The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file,
🔍 CVE-2023-31068: An issue was discovered in TSplus Remote Access through 16.0.2.14. There are Ful
CVE CVE-2023-31068 with CVSS 9.8. An issue was discovered in TSplus Remote Access through 16.0.2.14. There are Full Control permissions for Everyone on some directories under %PROGRAMFILES(X86)%\TSplus\UserDesktop\themes.
🔍 CVE-2023-31069: An issue was discovered in TSplus Remote Access through 16.0.2.14. Credentials a
CVE CVE-2023-31069 with CVSS 9.8. An issue was discovered in TSplus Remote Access through 16.0.2.14. Credentials are stored as cleartext within the HTML source code of the login page.
🔍 CVE-2023-39675: SimpleImportProduct Prestashop Module v6.2.9 was discovered to contain a SQL inj
CVE CVE-2023-39675 with CVSS 9.8. SimpleImportProduct Prestashop Module v6.2.9 was discovered to contain a SQL injection vulnerability via the key parameter at send.php.
🔍 CVE-2023-22515: Atlassian has been made aware of an issue reported by a handful of customers whe
CVE CVE-2023-22515 with CVSS 9.8. Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluenc
🔍 CVE-2023-5204: The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid p
CVE CVE-2023-5204 with CVSS 9.8. The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attac
🔍 CVE-2020-36706: The Simple:Press – WordPress Forum Plugin for WordPress is vulnerable to arbitra
CVE CVE-2020-36706 with CVSS 9.8. The Simple:Press – WordPress Forum Plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ~/admin/resources/jscript/ajaxupload/sf-uploader.php file in versions up to, and including, 6.6.0. This makes it possible for attackers to upload arbitrary files
🔍 CVE-2023-4488: The Dropbox Folder Share for WordPress is vulnerable to Local File Inclusion in
CVE CVE-2023-4488 with CVSS 9.8. The Dropbox Folder Share for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 1.9.7 via the editor-view.php file. This allows unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This c
🔍 CVE-2023-47104: tinyfiledialogs (aka tiny file dialogs) before 3.15.0 allows shell metacharacter
CVE CVE-2023-47104 with CVSS 9.8. tinyfiledialogs (aka tiny file dialogs) before 3.15.0 allows shell metacharacters (such as a backquote or a dollar sign) in titles, messages, and other input data. NOTE: this issue exists because of an incomplete fix for CVE-2020-36767, which only considered single and double quote characters.
🔍 CVE-2023-3277: The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access
CVE CVE-2023-3277 with CVSS 9.8. The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's em
🔍 CVE-2023-38382: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-38382 with CVSS 9.8. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Daniel Söderström / Sidney van de Stouwe Subscribe to Category allows SQL Injection.This issue affects Subscribe to Category: from n/a through 2.7.4.
🔍 CVE-2023-5212: The AI ChatBot plugin for WordPress is vulnerable to Arbitrary File Deletion in
CVE CVE-2023-5212 with CVSS 9.6. The AI ChatBot plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to, and including, 4.8.9 as well as version 4.9.2. This makes it possible for authenticated attackers with subscriber privileges to delete arbitrary files on the server, which makes it possible to take over a
🔍 CVE-2023-5241: The AI ChatBot for WordPress is vulnerable to Directory Traversal in versions up
CVE CVE-2023-5241 with CVSS 9.6. The AI ChatBot for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.8.9 as well as 4.9.2 via the qcld_openai_upload_pagetraining_file function. This allows subscriber-level attackers to append "<?php" to any existing file on the server resulting in potential DoS whe
🔍 CVE-2023-44208: Sensitive information disclosure and manipulation due to missing authorization.
CVE CVE-2023-44208 with CVSS 9.1. Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713, Acronis True Image OEM (Windows) before build 42575.
🔍 CVE-2023-5414: The Icegram Express plugin for WordPress is vulnerable to Directory Traversal in
CVE CVE-2023-5414 with CVSS 9.1. The Icegram Express plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 5.6.23 via the show_es_logs function. This allows administrator-level attackers to read the contents of arbitrary files on the server, which can contain sensitive information including tho
🔍 CVE-2023-44373: Affected devices do not properly sanitize an input field. This could allow an a
CVE CVE-2023-44373 with CVSS 9.1. Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
🔍 CVE-2023-5843: The Ads by datafeedr.com plugin for WordPress is vulnerable to Remote Code Execu
CVE CVE-2023-5843 with CVSS 9. The Ads by datafeedr.com plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.1.3 via the 'dfads_ajax_load_ads' function. This allows unauthenticated attackers to execute code on the server. The parameters of the callable function are limited, they cannot b
🔍 CVE-2023-4153: The BAN Users plugin for WordPress is vulnerable to privilege escalation in vers
CVE CVE-2023-4153 with CVSS 8.8. The BAN Users plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.5.3 due to a missing capability check on the 'w3dev_save_ban_user_settings_callback' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscribe
🔍 CVE-2023-4213: The Simplr Registration Form Plus+ plugin for WordPress is vulnerable to Insecur
CVE CVE-2023-4213 with CVSS 8.8. The Simplr Registration Form Plus+ plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.4.5. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it po
🔍 CVE-2023-4916: The Login with phone number plugin for WordPress is vulnerable to Cross-Site Req
CVE CVE-2023-4916 with CVSS 8.8. The Login with phone number plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.6. This is due to missing nonce validation on the 'lwp_update_password_action' function. This makes it possible for unauthenticated attackers to change user password via
🔍 CVE-2023-36419: Azure HDInsight Apache Oozie Workflow Scheduler XXE Elevation of Privilege Vulne
CVE CVE-2023-36419 with CVSS 8.8. Azure HDInsight Apache Oozie Workflow Scheduler XXE Elevation of Privilege Vulnerability
🔍 CVE-2023-5336: The iPanorama 360 – WordPress Virtual Tour Builder plugin for WordPress is vulne
CVE CVE-2023-5336 with CVSS 8.8. The iPanorama 360 – WordPress Virtual Tour Builder plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 1.8.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This mak
🔍 CVE-2020-36698: The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to u
CVE CVE-2020-36698 with CVSS 8.8. The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to unauthorized user interaction in versions up to, and including, 2.50. This is due to missing capability checks on several AJAX actions and nonce disclosure in the source page of the administrative dashboard. This makes it
🔍 CVE-2023-4598: The Slimstat Analytics plugin for WordPress is vulnerable to SQL Injection via t
CVE CVE-2023-4598 with CVSS 8.8. The Slimstat Analytics plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 5.0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authentic
🔍 CVE-2021-4334: The Fancy Product Designer plugin for WordPress is vulnerable to unauthorized mo
CVE CVE-2021-4334 with CVSS 8.8. The Fancy Product Designer plugin for WordPress is vulnerable to unauthorized modification of site options due to a missing capability check on the fpd_update_options function in versions up to, and including, 4.6.9. This makes it possible for authenticated attackers with subscriber-level permission
🔍 CVE-2022-2441: The ImageMagick Engine plugin for WordPress is vulnerable to remote code executi
CVE CVE-2022-2441 with CVSS 8.8. The ImageMagick Engine plugin for WordPress is vulnerable to remote code execution via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to run arbitrary commands leading to remote command execution, granted they can trick a site admini
🔍 CVE-2022-4290: The Cyr to Lat plugin for WordPress is vulnerable to authenticated SQL Injection
CVE CVE-2022-4290 with CVSS 8.8. The Cyr to Lat plugin for WordPress is vulnerable to authenticated SQL Injection via the 'ctl_sanitize_title' function in versions up to, and including, 3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This potentially allo
🔍 CVE-2023-4999: The Horizontal scrolling announcement plugin for WordPress is vulnerable to SQL
CVE CVE-2023-4999 with CVSS 8.8. The Horizontal scrolling announcement plugin for WordPress is vulnerable to SQL Injection via the plugin's [horizontal-scrolling] shortcode in versions up to, and including, 9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
🔍 CVE-2023-5311: The WP EXtra plugin for WordPress is vulnerable to unauthorized modification of
CVE CVE-2023-5311 with CVSS 8.8. The WP EXtra plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify the cont
🔍 CVE-2023-5425: The Post Meta Data Manager plugin for WordPress is vulnerable to unauthorized mo
CVE CVE-2023-5425 with CVSS 8.8. The Post Meta Data Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pmdm_wp_change_user_meta and pmdm_wp_change_post_meta functions in versions up to, and including, 1.2.0. This makes it possible for authenticated attackers, wit
🔍 CVE-2023-5250: The Grid Plus plugin for WordPress is vulnerable to Local File Inclusion in vers
CVE CVE-2023-5250 with CVSS 8.8. The Grid Plus plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 1.3.3 via a shortcode attribute. This allows subscriber-level, and above, attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files.
🔍 CVE-2023-5315: The Google Maps made Simple plugin for WordPress is vulnerable to SQL Injection
CVE CVE-2023-5315 with CVSS 8.8. The Google Maps made Simple plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authen
🔍 CVE-2023-5583: The WP Simple Galleries plugin for WordPress is vulnerable to PHP Object Injecti
CVE CVE-2023-5583 with CVSS 8.8. The WP Simple Galleries plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.34 via deserialization of untrusted input from the 'wpsimplegallery_gallery' post meta via 'wpsgallery' shortcode. This allows authenticated attackers, with contributor-level permis
🔍 CVE-2023-5412: The Image horizontal reel scroll slideshow plugin for WordPress is vulnerable to
CVE CVE-2023-5412 with CVSS 8.8. The Image horizontal reel scroll slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 13.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it pos
🔍 CVE-2023-5428: The Image vertical reel scroll slideshow plugin for WordPress is vulnerable to S
CVE CVE-2023-5428 with CVSS 8.8. The Image vertical reel scroll slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 9.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possib
🔍 CVE-2023-5429: The Information Reel plugin for WordPress is vulnerable to SQL Injection via the
CVE CVE-2023-5429 with CVSS 8.8. The Information Reel plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticate
🔍 CVE-2023-5430: The Jquery news ticker plugin for WordPress is vulnerable to SQL Injection via t
CVE CVE-2023-5430 with CVSS 8.8. The Jquery news ticker plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticat
🔍 CVE-2023-5431: The Left right image slideshow gallery plugin for WordPress is vulnerable to SQL
CVE CVE-2023-5431 with CVSS 8.8. The Left right image slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possibl
🔍 CVE-2023-5433: The Message ticker plugin for WordPress is vulnerable to SQL Injection via the p
CVE CVE-2023-5433 with CVSS 8.8. The Message ticker plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated a
🔍 CVE-2023-5434: The Superb slideshow gallery plugin for WordPress is vulnerable to SQL Injection
CVE CVE-2023-5434 with CVSS 8.8. The Superb slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 13.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for auth
🔍 CVE-2023-5435: The Up down image slideshow gallery plugin for WordPress is vulnerable to SQL In
CVE CVE-2023-5435 with CVSS 8.8. The Up down image slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible f
🔍 CVE-2023-5436: The Vertical marquee plugin for WordPress is vulnerable to SQL Injection via the
CVE CVE-2023-5436 with CVSS 8.8. The Vertical marquee plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated
🔍 CVE-2023-5437: The WP fade in text news plugin for WordPress is vulnerable to SQL Injection via
CVE CVE-2023-5437 with CVSS 8.8. The WP fade in text news plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenti
🔍 CVE-2023-5438: The wp image slideshow plugin for WordPress is vulnerable to SQL Injection via t
CVE CVE-2023-5438 with CVSS 8.8. The wp image slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authentica
🔍 CVE-2023-5439: The Wp photo text slider 50 plugin for WordPress is vulnerable to SQL Injection
CVE CVE-2023-5439 with CVSS 8.8. The Wp photo text slider 50 plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 8.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authen
🔍 CVE-2023-5464: The Jquery accordion slideshow plugin for WordPress is vulnerable to SQL Injecti
CVE CVE-2023-5464 with CVSS 8.8. The Jquery accordion slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 8.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for aut
🔍 CVE-2023-5099: The HTML filter and csv-file search plugin for WordPress is vulnerable to Local
CVE CVE-2023-5099 with CVSS 8.8. The HTML filter and csv-file search plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.7 via the 'src' attribute of the 'csvsearch' shortcode. This allows authenticated attackers, with contributor-level permissions and above, to include and execute arbitra
🔍 CVE-2023-5178: A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet
CVE CVE-2023-5178 with CVSS 8.8. A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lea
🔍 CVE-2022-45373: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2022-45373 with CVSS 8.8. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jason Crouse, VeronaLabs Slimstat Analytics allows SQL Injection.This issue affects Slimstat Analytics: from n/a through 5.0.4.
🔍 CVE-2023-5709: The WD WidgetTwitter plugin for WordPress is vulnerable to SQL Injection via the
CVE CVE-2023-5709 with CVSS 8.8. The WD WidgetTwitter plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 1.0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticat
🔍 CVE-2023-25983: Improper Neutralization of Formula Elements in a CSV File vulnerability in WPOmn
CVE CVE-2023-25983 with CVSS 8.8. Improper Neutralization of Formula Elements in a CSV File vulnerability in WPOmnia KB Support.This issue affects KB Support: from n/a through 1.5.84.
🔍 CVE-2023-40923: MyPrestaModules ordersexport before v5.0 was discovered to contain multiple SQL
CVE CVE-2023-40923 with CVSS 8.8. MyPrestaModules ordersexport before v5.0 was discovered to contain multiple SQL injection vulnerabilities at send.php via the key and save_setting parameters.
🔍 CVE-2023-1888: CVE-2023-1888
CVE CVE-2023-1888 with CVSS 8.8. The Directorist plugin for WordPress is vulnerable to an arbitrary user password reset in versions up to, and including, 7.5.4. This is due to a lack of validation checks within login.php. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset the p
🔍 CVE-2023-2237: CVE-2023-2237
CVE CVE-2023-2237 with CVSS 8.8. The WP Replicate Post plugin for WordPress is vulnerable to SQL Injection via the post_id parameter in versions up to, and including, 4.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for contributo
🔍 CVE-2023-2249: CVE-2023-2249
CVE CVE-2023-2249 with CVSS 8.8. The wpForo Forum plugin for WordPress is vulnerable to Local File Include, Server-Side Request Forgery, and PHAR Deserialization in versions up to, and including, 2.1.7. This is due to the insecure use of file_get_contents without appropriate verification of the data being supplied to the function.
🔍 CVE-2023-5523: Execution of downloaded content flaw in M-Files Web Companion before release ver
CVE CVE-2023-5523 with CVSS 8.6. Execution of downloaded content flaw in M-Files Web Companion before release version 23.10 and LTS Service Release Versions before 23.8 LTS SR1 allows Remote Code Execution
🔍 CVE-2023-28777: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-28777 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LearnDash LearnDash LMS allows SQL Injection.This issue affects LearnDash LMS: from n/a through 4.5.3.
🔍 CVE-2023-31212: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-31212 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CRM Perks Database for Contact Form 7, WPforms, Elementor forms contact-form-entries allows SQL Injection.This issue affects Database for Contact Form 7, WPforms, Elementor forms: from n/a through 1
🔍 CVE-2023-34383: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-34383 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP Project Manager wedevs-project-manager allows SQL Injection.This issue affects WP Project Manager: from n/a through 2.6.0.
🔍 CVE-2022-46859: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2022-46859 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spiffy Plugins Spiffy Calendar spiffy-calendar allows SQL Injection.This issue affects Spiffy Calendar: from n/a through 4.9.1.
🔍 CVE-2023-35910: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-35910 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nucleus_genius Quasar form free – Contact Form Builder for WordPress allows SQL Injection.This issue affects Quasar form free – Contact Form Builder for WordPress: from n/a through 6.0.
🔍 CVE-2022-46860: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2022-46860 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in KaizenCoders Short URL allows SQL Injection.This issue affects Short URL: from n/a through 1.6.4.
🔍 CVE-2023-28748: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-28748 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in biztechc Copy or Move Comments allows SQL Injection.This issue affects Copy or Move Comments: from n/a through 5.0.4.
🔍 CVE-2023-35911: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-35911 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Creative Solutions Contact Form Generator : Creative form builder for WordPress allows SQL Injection.This issue affects Contact Form Generator : Creative form builder for WordPress: from n/a through
🔍 CVE-2023-45001: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-45001 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Castos Seriously Simple Stats allows SQL Injection.This issue affects Seriously Simple Stats: from n/a through 1.5.0.
🔍 CVE-2023-45055: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-45055 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in InspireUI MStore API allows SQL Injection.This issue affects MStore API: from n/a through 4.0.6.
🔍 CVE-2023-45074: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-45074 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Page Visit Counter Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress allows SQL Injection.This issue affects Advanced Page Visit Counter – Most Wanted Analytics Plugin for Wor
🔍 CVE-2023-45657: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-45657 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in POSIMYTH Nexter allows SQL Injection.This issue affects Nexter: from n/a through 2.0.3.
🔍 CVE-2023-46084: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-46084 with CVSS 8.5. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bPlugins LLC Icons Font Loader allows SQL Injection.This issue affects Icons Font Loader: from n/a through 1.1.2.
🔍 CVE-2023-1895: CVE-2023-1895
CVE CVE-2023-1895 with CVSS 8.5. The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Server Side Request Forgery via the get_remote_content REST API endpoint in versions up to, and including, 1.8.3. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary lo
🔍 CVE-2023-36677: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-36677 with CVSS 8.3. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Smartypants SP Project & Document Manager allows SQL Injection.This issue affects SP Project & Document Manager: from n/a through 4.67.
🔍 CVE-2023-5524: Insufficient blacklisting in M-Files Web Companion before release version 23.10
CVE CVE-2023-5524 with CVSS 8.2. Insufficient blacklisting in M-Files Web Companion before release version 23.10 and LTS Service Release Versions before 23.8 LTS SR1 allows Remote Code Execution via specific file types
🔍 CVE-2023-24000: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-24000 with CVSS 8.2. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GamiPress gamipress allows SQL Injection.This issue affects GamiPress: from n/a through 2.5.7.
🔍 CVE-2023-41652: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-41652 with CVSS 8.2. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David F. Carr RSVPMaker rsvpmaker allows SQL Injection.This issue affects RSVPMaker: from n/a through 10.6.6.
🔍 CVE-2022-45805: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2022-45805 with CVSS 8.2. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Paytm Paytm Payment Gateway paytm-payments allows SQL Injection.This issue affects Paytm Payment Gateway: from n/a through 2.7.3.
🔍 CVE-2022-46808: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2022-46808 with CVSS 8.2. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Repute Infosystems ARMember armember-membership allows SQL Injection.This issue affects ARMember: from n/a through 3.4.11.
🔍 CVE-2022-47445: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2022-47445 with CVSS 8.2. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Web-X Be POPIA Compliant be-popia-compliant allows SQL Injection.This issue affects Be POPIA Compliant: from n/a through 1.2.0.
🔍 CVE-2022-46818: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2022-46818 with CVSS 8.2. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Gopi Ramasamy Email posts to subscribers allows SQL Injection.This issue affects Email posts to subscribers: from n/a through 6.2.
🔍 CVE-2023-25700: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-25700 with CVSS 8.2. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.1.10.
🔍 CVE-2023-40609: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-40609 with CVSS 8.2. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aiyaz, maheshpatel Contact form 7 Custom validation allows SQL Injection.This issue affects Contact form 7 Custom validation: from n/a through 1.1.3.
🔍 CVE-2023-41682: A improper limitation of a pathname to a restricted directory ('path traversal')
CVE CVE-2023-41682 with CVSS 8.1. A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiSandbox 4.4.0, FortiSandbox 4.2.1 through 4.2.5, FortiSandbox 4.0.0 through 4.0.3, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions, FortiSandbox
🔍 CVE-2023-4402: The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection
CVE CVE-2023-4402 with CVSS 8.1. The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_products function. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin.
🔍 CVE-2023-4386: The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection
CVE CVE-2023-4386 with CVSS 8.1. The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_posts function. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If
🔍 CVE-2023-25800: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-25800 with CVSS 8.1. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.2.0.
🔍 CVE-2023-4214: The AppPresser plugin for WordPress is vulnerable to unauthorized password reset
CVE CVE-2023-4214 with CVSS 8.1. The AppPresser plugin for WordPress is vulnerable to unauthorized password resets in versions up to, and including 4.2.5. This is due to the plugin generating too weak a reset code, and the code used to reset the password has no attempt or time limit.
🔍 CVE-2023-5576: The Migration, Backup, Staging - WPvivid plugin for WordPress is vulnerable to S
CVE CVE-2023-5576 with CVSS 8. The Migration, Backup, Staging - WPvivid plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 0.9.91 via Google Drive API secrets stored in plaintext in the publicly visible plugin source. This could allow unauthenticated attackers to impersonate the
🔍 CVE-2023-41743: Local privilege escalation due to insecure driver communication port permissions
CVE CVE-2023-41743 with CVSS 7.8. Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Cyber Protect Cloud Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979
🔍 CVE-2022-46869: Local privilege escalation during installation due to improper soft link handlin
CVE CVE-2022-46869 with CVSS 7.8. Local privilege escalation during installation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis True Image OEM (Windows) before build 42575.
🔍 CVE-2023-4911: A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so whi
CVE CVE-2023-4911 with CVSS 7.8. A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code
🔍 CVE-2023-44209: Local privilege escalation due to improper soft link handling. The following pro
CVE CVE-2023-44209 with CVSS 7.8. Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 29051, Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186.
🔍 CVE-2023-5633: The reference count changes made as part of the CVE-2023-33951 and CVE-2023-3395
CVE CVE-2023-5633 with CVSS 7.8. The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could
🔍 CVE-2023-36424: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE CVE-2023-36424 with CVSS 7.8. Windows Common Log File System Driver Elevation of Privilege Vulnerability
🔍 CVE-2023-33927: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-33927 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeisle Multiple Page Generator Plugin – MPG multiple-pages-generator-by-porthas allows SQL Injection.This issue affects Multiple Page Generator Plugin – MPG: from n/a through 3.3.19.
🔍 CVE-2023-35879: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-35879 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WooCommerce Product Vendors allows SQL Injection.This issue affects Product Vendors: from n/a through 2.1.78.
🔍 CVE-2023-36508: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-36508 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress contact-form-to-db allows SQL Injection.This issue affects Contact Form to DB by BestWebSoft – Messages Databas
🔍 CVE-2023-37966: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-37966 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Solwin Infotech User Activity Log user-activity-log allows SQL Injection.This issue affects User Activity Log: from n/a through 1.6.2.
🔍 CVE-2023-32121: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-32121 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Highfivery LLC Zero Spam for WordPress allows SQL Injection.This issue affects Zero Spam for WordPress: from n/a through 5.4.4.
🔍 CVE-2023-32508: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-32508 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rolf van Gelder Order Your Posts Manually allows SQL Injection.This issue affects Order Your Posts Manually: from n/a through 2.2.5.
🔍 CVE-2023-34179: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-34179 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Groundhogg Inc. Groundhogg allows SQL Injection.This issue affects Groundhogg: from n/a through 2.7.11.
🔍 CVE-2023-32741: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-32741 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in IT Path Solutions PVT LTD Contact Form to Any API allows SQL Injection.This issue affects Contact Form to Any API: from n/a through 1.1.2.
🔍 CVE-2023-40215: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-40215 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Demonisblack demon image annotation allows SQL Injection.This issue affects demon image annotation: from n/a through 5.1.
🔍 CVE-2022-46849: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2022-46849 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Weblizar Coming Soon Page – Responsive Coming Soon & Maintenance Mode allows SQL Injection.This issue affects Coming Soon Page – Responsive Coming Soon & Maintenance Mode: from n/a through 1.5.9.
🔍 CVE-2023-33924: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-33924 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Felix Welberg SIS Handball allows SQL Injection.This issue affects SIS Handball: from n/a through 1.0.45.
🔍 CVE-2023-40207: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-40207 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RedNao Donations Made Easy – Smart Donations allows SQL Injection.This issue affects Donations Made Easy – Smart Donations: from n/a through 4.0.12.
🔍 CVE-2023-41685: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-41685 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ilGhera Woocommerce Support System allows SQL Injection.This issue affects Woocommerce Support System: from n/a through 1.2.1.
🔍 CVE-2023-45069: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-45069 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Video Gallery by Total-Soft Video Gallery – Best WordPress YouTube Gallery Plugin allows SQL Injection.This issue affects Video Gallery – Best WordPress YouTube Gallery Plugin: from n/a through 2.1.
🔍 CVE-2023-46821: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-46821 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Milan Petrovic GD Security Headers allows auth. (admin+) SQL Injection.This issue affects GD Security Headers: from n/a through 1.7.
🔍 CVE-2023-46823: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-46823 with CVSS 7.6. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Avirtum ImageLinks Interactive Image Builder for WordPress allows SQL Injection.This issue affects ImageLinks Interactive Image Builder for WordPress: from n/a through 1.5.4.
🔍 CVE-2022-41616: Improper Neutralization of Formula Elements in a CSV File vulnerability in Kaush
CVE CVE-2022-41616 with CVSS 7.6. Improper Neutralization of Formula Elements in a CSV File vulnerability in Kaushik Kalathiya Export Users Data CSV.This issue affects Export Users Data CSV: from n/a through 2.1.
🔍 CVE-2023-4785: Lack of error handling in the TCP server in Google's gRPC starting version 1.23
CVE CVE-2023-4785 with CVSS 7.5. Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java
🔍 CVE-2023-5042: Sensitive information disclosure due to insecure folder permissions. The followi
CVE CVE-2023-5042 with CVSS 7.5. Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713, Acronis True Image OEM (Windows) before build 42575.
🔍 CVE-2023-39677: MyPrestaModules Prestashop Module v6.2.9 and UpdateProducts Prestashop Module v3
CVE CVE-2023-39677 with CVSS 7.5. MyPrestaModules Prestashop Module v6.2.9 and UpdateProducts Prestashop Module v3.6.9 were discovered to contain a PHPInfo information disclosure vulnerability via send.php.
🔍 CVE-2023-43314: ** UNSUPPORTED WHEN ASSIGNED **The buffer overflow vulnerability in the Zyxel PM
CVE CVE-2023-43314 with CVSS 7.5. ** UNSUPPORTED WHEN ASSIGNED **The buffer overflow vulnerability in the Zyxel PMG2005-T20B firmware version V1.00(ABNK.2)b11_C0 could allow an unauthenticated attacker to cause a denial of service condition via a crafted uid.
🔍 CVE-2023-41680: A improper neutralization of input during web page generation ('cross-site scrip
CVE CVE-2023-41680 with CVSS 7.5. A improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.1, FortiSandbox 4.2.1 through 4.2.5, FortiSandbox 4.0.0 through 4.0.3, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all ve
🔍 CVE-2023-41681: A improper neutralization of input during web page generation ('cross-site scrip
CVE CVE-2023-41681 with CVSS 7.5. A improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.1, FortiSandbox 4.2.1 through 4.2.5, FortiSandbox 4.0.0 through 4.0.3, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all ve
🔍 CVE-2023-41843: A improper neutralization of input during web page generation ('cross-site scrip
CVE CVE-2023-41843 with CVSS 7.5. A improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.1, FortiSandbox 4.2.1 through 4.2.5, FortiSandbox 4.0.0 through 4.0.3, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all ve
🔍 CVE-2022-3342: The Jetpack CRM plugin for WordPress is vulnerable to PHAR deserialization via t
CVE CVE-2022-3342 with CVSS 7.5. The Jetpack CRM plugin for WordPress is vulnerable to PHAR deserialization via the ‘zbscrmcsvimpf’ parameter in the 'zeroBSCRM_CSVImporterLitehtml_app' function in versions up to, and including, 5.3.1. While the function performs a nonce check, steps 2 and 3 of the check do not take any action upon
🔍 CVE-2022-4943: The miniOrange's Google Authenticator plugin for WordPress is vulnerable to auth
CVE CVE-2022-4943 with CVSS 7.5. The miniOrange's Google Authenticator plugin for WordPress is vulnerable to authorization bypass due to a missing capability check when changing plugin settings in versions up to, and including, 5.6.5. This makes it possible for unauthenticated attackers to change the plugin's settings.
🔍 CVE-2023-5132: The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized a
CVE CVE-2023-5132 with CVSS 7.5. The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce O
🔍 CVE-2023-5426: The Post Meta Data Manager plugin for WordPress is vulnerable to unauthorized mo
CVE CVE-2023-5426 with CVSS 7.5. The Post Meta Data Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pmdm_wp_delete_user_meta, pmdm_wp_delete_term_meta, and pmdm_wp_ajax_delete_meta functions in versions up to, and including, 1.2.0. This makes it possible for
🔍 CVE-2023-46129: NATS.io is a high performance open source pub-sub distributed communication tech
CVE CVE-2023-46129 with CVSS 7.5. NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.
🔍 CVE-2023-39198: A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_d
CVE CVE-2023-39198 with CVSS 7.5. A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value a
🔍 CVE-2023-5245: FileUtil.extract() enumerates all zip file entries and extracts each file withou
CVE CVE-2023-5245 with CVSS 7.5. FileUtil.extract() enumerates all zip file entries and extracts each file without validating whether file paths in the archive are outside the intended directory. When creating an instance of TensorflowModel using the saved_model format and an exported tensorflow model, the apply() function invokes
🔍 CVE-2023-6187: The Paid Memberships Pro plugin for WordPress is vulnerable to arbitrary file up
CVE CVE-2023-6187 with CVSS 7.5. The Paid Memberships Pro plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'pmpro_paypalexpress_session_vars_for_user_fields' function in versions up to, and including, 2.12.3. This makes it possible for authenticated attackers with subscrib
🔍 CVE-2020-36714: The Brizy plugin for WordPress is vulnerable to authorization bypass due to a in
CVE CVE-2020-36714 with CVSS 7.4. The Brizy plugin for WordPress is vulnerable to authorization bypass due to a incorrect capability check on the is_administrator() function in versions up to, and including, 1.0.125. This makes it possible for authenticated attackers to access and interact with available AJAX functions.
🔍 CVE-2023-2325: Stored XSS Vulnerability in M-Files Classic Web versions before 23.10 and LTS Se
CVE CVE-2023-2325 with CVSS 7.3. Stored XSS Vulnerability in M-Files Classic Web versions before 23.10 and LTS Service Release Versions before 23.2 LTS SR4 and 23.8 LTS SR1allows attacker to execute script on users browser via stored HTML document.
🔍 CVE-2023-4719: The Simple Membership plugin for WordPress is vulnerable to Reflected Cross-Site
CVE CVE-2023-4719 with CVSS 7.2. The Simple Membership plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `list_type` parameter in versions up to, and including, 4.3.5 due to insufficient input sanitization and output escaping. Using this vulnerability, unauthenticated attackers could inject arbitrary web
🔍 CVE-2023-38156: Azure HDInsight Apache Ambari JDBC Injection Elevation of Privilege Vulnerabilit
CVE CVE-2023-38156 with CVSS 7.2. Azure HDInsight Apache Ambari JDBC Injection Elevation of Privilege Vulnerability
🔍 CVE-2023-3025: The Dropbox Folder Share plugin for WordPress is vulnerable to Server-Side Reque
CVE CVE-2023-3025 with CVSS 7.2. The Dropbox Folder Share plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 1.9.7 via the 'link' parameter. This can allow unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to qu
🔍 CVE-2023-5538: The MpOperationLogs plugin for WordPress is vulnerable to Stored Cross-Site Scri
CVE CVE-2023-5538 with CVSS 7.2. The MpOperationLogs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the IP Request Headers in versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in
🔍 CVE-2022-4712: The WP Cerber Security plugin for WordPress is vulnerable to stored cross-site s
CVE CVE-2022-4712 with CVSS 7.2. The WP Cerber Security plugin for WordPress is vulnerable to stored cross-site scripting via the log parameter when logging in to the site in versions up to, and including, 9.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a
🔍 CVE-2023-5860: The Icons Font Loader plugin for WordPress is vulnerable to arbitrary file uploa
CVE CVE-2023-5860 with CVSS 7.2. The Icons Font Loader plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with administrator-level access and above, to upload arbitrar
🔍 CVE-2023-2484: CVE-2023-2484
CVE CVE-2023-2484 with CVSS 7.2. The Active Directory Integration plugin for WordPress is vulnerable to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 4.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This
🔍 CVE-2023-2607: CVE-2023-2607
CVE CVE-2023-2607 with CVSS 7.2. The Multiple Page Generator Plugin for WordPress is vulnerable to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 3.3.17 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This make
🔍 CVE-2023-40205: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Pixelgrade PixType
CVE CVE-2023-40205 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Pixelgrade PixTypes plugin <= 1.4.15 versions.
🔍 CVE-2023-26015: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-26015 with CVSS 7.1. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Chris Richardson MapPress Maps for WordPress mappress-google-maps-for-wordpress allows SQL Injection.This issue affects MapPress Maps for WordPress: from n/a through 2.85.4.
🔍 CVE-2023-25990: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE CVE-2023-25990 with CVSS 7.1. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.1.10.
🔍 CVE-2023-46822: Unauth. Reflected Cross-Site Scripting') vulnerability in Visser Labs Store Expo
CVE CVE-2023-46822 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting') vulnerability in Visser Labs Store Exporter for WooCommerce – Export Products, Export Orders, Export Subscriptions, and More plugin <= 2.7.2 versions.
🔍 CVE-2023-47182: Cross-Site Request Forgery (CSRF) leading to a Stored Cross-Site Scripting (XSS)
CVE CVE-2023-47182 with CVSS 7.1. Cross-Site Request Forgery (CSRF) leading to a Stored Cross-Site Scripting (XSS) vulnerability in Nazmul Hossain Nihal Login Screen Manager plugin <= 3.5.2 versions.
🔍 CVE-2023-47185: Unauth. Stored Cross-Site Scripting (XSS) vulnerability in gVectors Team Comment
CVE CVE-2023-47185 with CVSS 7.1. Unauth. Stored Cross-Site Scripting (XSS) vulnerability in gVectors Team Comments — wpDiscuz plugin <= 7.6.11 versions.
🔍 CVE-2023-47510: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPSolutions-HQ WPD
CVE CVE-2023-47510 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPSolutions-HQ WPDBSpringClean plugin <= 1.6 versions.
🔍 CVE-2023-32298: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Kathy Darling Simp
CVE CVE-2023-32298 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Kathy Darling Simple User Listing plugin <= 1.9.2 versions.
🔍 CVE-2023-46621: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Enej Bajgoric / Ga
CVE CVE-2023-46621 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Enej Bajgoric / Gagan Sandhu / CTLT DEV User Avatar plugin <= 1.4.11 versions.
🔍 CVE-2023-46626: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FLOWFACT WP Connec
CVE CVE-2023-46626 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FLOWFACT WP Connector plugin <= 2.1.7 versions.
🔍 CVE-2023-46627: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ashish Ajani WordP
CVE CVE-2023-46627 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ashish Ajani WordPress Simple HTML Sitemap plugin <= 2.1 versions.
🔍 CVE-2023-46643: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GARY JEZORSKI Clou
CVE CVE-2023-46643 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GARY JEZORSKI CloudNet360 plugin <= 3.2.0 versions.
🔍 CVE-2023-23800: Server-Side Request Forgery (SSRF) vulnerability in Vova Anokhin WP Shortcodes P
CVE CVE-2023-23800 with CVSS 7.1. Server-Side Request Forgery (SSRF) vulnerability in Vova Anokhin WP Shortcodes Plugin — Shortcodes Ultimate.This issue affects WP Shortcodes Plugin — Shortcodes Ultimate: from n/a through 5.12.6.
🔍 CVE-2023-46634: Cross-Site Request Forgery (CSRF) vulnerability in phoeniixx Custom My Account f
CVE CVE-2023-46634 with CVSS 7.1. Cross-Site Request Forgery (CSRF) vulnerability in phoeniixx Custom My Account for Woocommerce allows Cross-Site Scripting (XSS).This issue affects Custom My Account for Woocommerce: from n/a through 2.1.
🔍 CVE-2023-47516: Cross-Site Request Forgery (CSRF) vulnerability in Stark Digital Category Post L
CVE CVE-2023-47516 with CVSS 7.1. Cross-Site Request Forgery (CSRF) vulnerability in Stark Digital Category Post List Widget allows Stored XSS.This issue affects Category Post List Widget: from n/a through 2.0.
🔍 CVE-2023-47652: Cross-Site Request Forgery (CSRF) vulnerability in Lucian Apostol Auto Affiliate
CVE CVE-2023-47652 with CVSS 7.1. Cross-Site Request Forgery (CSRF) vulnerability in Lucian Apostol Auto Affiliate Links allows Stored XSS.This issue affects Auto Affiliate Links: from n/a through 6.4.2.4.
🔍 CVE-2023-40335: Cross-Site Request Forgery (CSRF) vulnerability in Jeremy O'Connell Cleverwise D
CVE CVE-2023-40335 with CVSS 7.1. Cross-Site Request Forgery (CSRF) vulnerability in Jeremy O'Connell Cleverwise Daily Quotes allows Stored XSS.This issue affects Cleverwise Daily Quotes: from n/a through 3.2.
🔍 CVE-2023-39166: Cross-Site Request Forgery (CSRF) vulnerability in tagDiv tagDiv Composer allows
CVE CVE-2023-39166 with CVSS 7.1. Cross-Site Request Forgery (CSRF) vulnerability in tagDiv tagDiv Composer allows Cross-Site Scripting (XSS).This issue affects tagDiv Composer: from n/a before 4.4.
🔍 CVE-2023-31230: Cross-Site Request Forgery (CSRF) vulnerability in Haoqisir Baidu Tongji generat
CVE CVE-2023-31230 with CVSS 7.1. Cross-Site Request Forgery (CSRF) vulnerability in Haoqisir Baidu Tongji generator allows Stored XSS.This issue affects Baidu Tongji generator: from n/a through 1.0.2.
🔍 CVE-2023-47550: Cross-Site Request Forgery (CSRF) vulnerability in RedNao Donations Made Easy –
CVE CVE-2023-47550 with CVSS 7.1. Cross-Site Request Forgery (CSRF) vulnerability in RedNao Donations Made Easy – Smart Donations allows Stored XSS.This issue affects Donations Made Easy – Smart Donations: from n/a through 4.0.12.
🔍 CVE-2023-47544: Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Atarim Visual Website
CVE CVE-2023-47544 with CVSS 7.1. Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Atarim Visual Website Collaboration, Feedback & Project Management – Atarim plugin <= 3.12 versions.
🔍 CVE-2023-47517: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in SendPress Newslett
CVE CVE-2023-47517 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in SendPress Newsletters plugin <= 1.23.11.6 versions.
🔍 CVE-2023-47512: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Gravity Master Pro
CVE CVE-2023-47512 with CVSS 7.1. Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Gravity Master Product Enquiry for WooCommerce plugin <= 3.0 versions.
🔍 CVE-2023-28621: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
CVE CVE-2023-28621 with CVSS 7.1. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wishfulthemes Raise Mag, Wishfulthemes Wishful Blog themes allows Reflected XSS.This issue affects Raise Mag: from n/a through 1.0.7; Wishful Blog: from n/a through 2.0.1.
🔍 CVE-2023-46813: An issue was discovered in the Linux kernel before 6.5.9, exploitable by local u
CVE CVE-2023-46813 with CVSS 7. An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thu
📄 Twitter Feed - MichalKoczwara - 07-03-2025
Threat report published 2025-03-08T00:10:31.940Z. Types: threat-report.
📄 Malware Filter - Phishing List - 07-03-2025
Threat report published 2025-03-08T00:10:34.060Z. Types: threat-report.
📄 When Data Tools Become Dangerous: MS Power BI Links Used in Phishing Campaigns
Threat report published 2025-02-06T15:54:44.910Z. Types: threat-report. A sophisticated phishing campaign has been detected that exploits trusted platforms like SharePoint and Power BI to steal user credentials. The scheme uses a seemingly legitimate SharePoint link in an
📄 SmokeLoader Malware Targets Ukraine's Auto & Banking Sectors via Open Directories
Threat report published 2025-02-07T00:08:44.762Z. Types: threat-report. An investigation uncovered open directories hosting SmokeLoader malware samples and lure documents targeting Ukraine's automotive and banking sectors. Two servers were identified, containing Windows e
📄 Not-so-SimpleHelp exploits enabling deployment of Sliver backdoor
Threat report published 2025-02-07T00:08:41.573Z. Types: threat-report. A sophisticated breach was identified where threat actors exploited vulnerabilities in SimpleHelp's Remote Monitoring and Management client to infiltrate a network. The attack involved post-compromise
📄 SideWinder targets the maritime and nuclear sectors with an updated toolset
Threat report published 2025-03-10T10:24:57.506Z. Types: threat-report. The SideWinder APT group intensified its activities in the second half of 2024, targeting maritime infrastructures, logistics companies, and nuclear sectors across Asia, the Middle East, and Africa. T
📄 Russian State Actors: Development in Group Attributions
Threat report published 2025-03-08T11:40:18.794Z. Types: threat-report. This analysis explores the evolution of Russian state-backed cyber actors and their operations. It highlights the activities of several prominent groups, including UNC2589, APT44 (Sandworm), APT29, an
📄 Malicious Packages Identified in the Wild: Insights and Trends from November 2024 Onward
Threat report published 2025-03-10T20:29:07.925Z. Types: threat-report. FortiGuard Labs has analyzed malicious software packages detected from November 2024 to March 2025, revealing various attack techniques used to exploit system vulnerabilities. Key findings include 1,0
📄 Desert Dexter.Attacks on Middle Eastern Countries
Threat report published 2025-03-11T16:42:12.802Z. Types: threat-report. A malicious campaign targeting residents of Middle East and North Africa has been discovered, active since September 2024. The attackers create fake news groups on social media and publish posts with
📄 Camera off: Akira deploys ransomware via webcam
Threat report published 2025-03-11T14:20:07.740Z. Types: threat-report. Akira, a prominent ransomware group, accounted for 15% of incidents in 2024, showcasing novel evasion techniques. In a recent attack, Akira circumvented an Endpoint Detection and Response (EDR) tool b
📄 Analysis of Lazarus Group's Attack Targeting Windows Web Servers
Threat report published 2025-03-11T14:20:42.819Z. Types: threat-report. The Lazarus group has been targeting Windows web servers, particularly in South Korea, installing webshells and C2 scripts to use compromised servers as proxies. The attacks involve multiple stages, i
📄 New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects
Threat report published 2025-03-11T17:34:54.928Z. Types: threat-report. Microsoft Threat Intelligence has discovered a new variant of XCSSET, a sophisticated macOS malware that infects Xcode projects. This latest version features enhanced obfuscation methods, updated pers
📄 Trump Cryptocurrency Delivers ConnectWise RAT
Threat report published 2025-03-11T17:34:55.389Z. Types: threat-report. An email campaign impersonating Binance is offering fake TRUMP coins to lure victims into downloading a malicious 'Binance Desktop' application, which actually installs ConnectWise RAT. The attackers
Weekly Digest
Get the week's top threats in 5 minutes
Every Monday: curated vulnerability analysis, insurance impact assessment, and actionable risk insights — delivered to your inbox.