Total
5022 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-38794 | 2024-11-01 | N/A | 5.3 MEDIUM | ||
Missing Authorization vulnerability in MediaRon LLC Custom Query Blocks allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Custom Query Blocks: from n/a through 5.2.0. | |||||
CVE-2024-43235 | 2024-11-01 | N/A | 7.1 HIGH | ||
Missing Authorization vulnerability in MetaBox.Io Meta Box – WordPress Custom Fields Framework allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Meta Box – WordPress Custom Fields Framework: from n/a through 5.9.10. | |||||
CVE-2024-37510 | 2024-11-01 | N/A | 6.5 MEDIUM | ||
Missing Authorization vulnerability in Charitable Donations & Fundraising Team Charitable allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Charitable: from n/a through 1.8.1.7. | |||||
CVE-2024-43277 | 2024-11-01 | N/A | 5.3 MEDIUM | ||
Missing Authorization vulnerability in AyeCode Ltd UsersWP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects UsersWP: from n/a through 1.2.15. | |||||
CVE-2024-38727 | 2024-11-01 | N/A | 4.3 MEDIUM | ||
Missing Authorization vulnerability in Seraphinite Solutions Seraphinite Post .DOCX Source allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Seraphinite Post .DOCX Source: from n/a through 2.16.9. | |||||
CVE-2024-37427 | 2024-11-01 | N/A | 5.3 MEDIUM | ||
Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Timetics: from n/a through 1.0.21. | |||||
CVE-2024-43270 | 2024-11-01 | N/A | 5.3 MEDIUM | ||
Missing Authorization vulnerability in WPBackItUp Backup and Restore WordPress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Backup and Restore WordPress: from n/a through 1.50. | |||||
CVE-2024-43134 | 2024-11-01 | N/A | 4.3 MEDIUM | ||
Missing Authorization vulnerability in xootix Waitlist Woocommerce ( Back in stock notifier ) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Waitlist Woocommerce ( Back in stock notifier ): from n/a through 2.6. | |||||
CVE-2024-37254 | 2024-11-01 | N/A | 4.3 MEDIUM | ||
Missing Authorization vulnerability in mndpsingh287 File Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects File Manager: from n/a through 7.2.7. | |||||
CVE-2024-38702 | 2024-11-01 | N/A | 5.3 MEDIUM | ||
Missing Authorization vulnerability in Tyche Softwares Product Delivery Date for WooCommerce – Lite allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Product Delivery Date for WooCommerce – Lite: from n/a through 2.7.2. | |||||
CVE-2024-37095 | 2024-11-01 | N/A | 4.3 MEDIUM | ||
Missing Authorization vulnerability in Envira Gallery Team Envira Photo Gallery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Envira Photo Gallery: from n/a through 1.8.7.3. | |||||
CVE-2024-39650 | 2024-11-01 | N/A | 7.3 HIGH | ||
Missing Authorization vulnerability in WPWeb Elite WooCommerce PDF Vouchers allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WooCommerce PDF Vouchers: from n/a through 4.9.4. | |||||
CVE-2024-43268 | 2024-11-01 | N/A | 5.4 MEDIUM | ||
Access Control vulnerability in WPBackItUp Backup and Restore WordPress allows . This issue affects Backup and Restore WordPress: from n/a through 1.50. | |||||
CVE-2024-43273 | 2024-11-01 | N/A | 5.4 MEDIUM | ||
Missing Authorization vulnerability in icegram Icegram Collect plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Icegram Collect plugin: from n/a through 1.3.14. | |||||
CVE-2024-37439 | 2024-11-01 | N/A | 5.4 MEDIUM | ||
Missing Authorization vulnerability in Uncanny Owl Uncanny Toolkit Pro for LearnDash allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Toolkit Pro for LearnDash: from n/a through 4.1.4.0 | |||||
CVE-2024-43229 | 2024-11-01 | N/A | 4.3 MEDIUM | ||
Missing Authorization vulnerability in Cornel Raiu WP Search Analytics allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Search Analytics: from n/a through 1.4.9. | |||||
CVE-2024-37207 | 2024-11-01 | N/A | 5.4 MEDIUM | ||
Missing Authorization vulnerability in Theme4Press Demo Awesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Demo Awesome: from n/a through 1.0.2. | |||||
CVE-2024-37929 | 2024-11-01 | N/A | 6.3 MEDIUM | ||
Missing Authorization vulnerability in solwin User Activity Log Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects User Activity Log Pro: from n/a through 2.3.4. | |||||
CVE-2024-37232 | 2024-11-01 | N/A | 8.8 HIGH | ||
Missing Authorization vulnerability in Hercules Design Hercules Core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hercules Core: from n/a through 6.5. | |||||
CVE-2024-43290 | 2024-11-01 | N/A | 5.3 MEDIUM | ||
Missing Authorization vulnerability in Atarim allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Atarim: from n/a through 4.0.1. |