NA - CVE-2024-57249 - Incorrect Access Control in the Preview...
Incorrect Access Control in the Preview Function of Gleamtech FileVista 9.2.0.0 allows remote attackers to gain unauthorized access via exploiting a vulnerability in access control mechanisms by...
High - CVE-2024-7419 - The WP ALL Export Pro plugin for WordPress is...
The WP ALL Export Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.1 via the custom export fields. This is due to the missing input...
Medium - CVE-2024-9661 - The WP All Import Pro plugin for WordPress is...
The WP All Import Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.9.7. This is due to missing nonce validation on the delete_and_edit...
High - CVE-2024-9664 - The WP All Import Pro plugin for WordPress is...
The WP All Import Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.9.7 via deserialization of untrusted input from an import file. This makes...
NA - CVE-2022-26388 - A use of hard-coded password vulnerability may...
A use of hard-coded password vulnerability may allow authentication abuse.This issue affects ELI 380 Resting Electrocardiograph: Versions 2.6.0 and prior; ELI 280/BUR280/MLBUR 280 Resting...
NA - CVE-2022-26389 - An improper access control vulnerability may...
An improper access control vulnerability may allow privilege escalation.This issue affects: * ELI 380 Resting Electrocardiograph: Versions 2.6.0 and prior; * ELI 280/BUR280/MLBUR 280...
Medium - CVE-2024-7425 - The WP ALL Export Pro plugin for WordPress is...
The WP ALL Export Pro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to improper user input validation and sanitization in all...
High - CVE-2025-1104 - A vulnerability has been found in D-Link...
A vulnerability has been found in D-Link DHP-W310AV 1.04 and classified as critical. This vulnerability affects unknown code. The manipulation leads to authentication bypass by spoofing. The attack...