NA - CVE-2024-7254 - Any project that parses untrusted Protocol...
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow....
Medium - CVE-2022-4533 - The Limit Login Attempts Plus plugin for...
The Limit Login Attempts Plus plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1.0. This is due to insufficient restrictions on where the IP Address...
NA - CVE-2024-8364 - The WP Custom Fields Search plugin for...
The WP Custom Fields Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcfs-preset shortcode in all versions up to, and including, 1.2.35 due to...
Medium - CVE-2024-8850 - The MC4WP: Mailchimp for WordPress plugin for...
The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email' parameter when a placeholder such as {email} is used for the field...
NA - CVE-2024-46946 - langchain_experimental (aka LangChain...
langchain_experimental (aka LangChain Experimental) 0.1.17 through 0.3.0 for LangChain allows attackers to execute arbitrary code through sympy.sympify (which uses eval) in LLMSymbolicMathChain....
NA - CVE-2024-47085 - This vulnerability exists in Apex Softcell LD...
This vulnerability exists in Apex Softcell LD DP Back Office due to improper validation of certain parameters (cCdslClicentcode and cLdClientCode) in the API endpoint. An authenticated remote...
NA - CVE-2024-47086 - This vulnerability exists in Apex Softcell LD...
This vulnerability exists in Apex Softcell LD DP Back Office due to improper implementation of OTP validation mechanism in certain API endpoints. An authenticated remote attacker could exploit this...
NA - CVE-2024-47087 - This vulnerability exists in Apex Softcell LD...
This vulnerability exists in Apex Softcell LD Geo due to improper validation of the certain parameters (Client ID, DPID or BOID) in the API endpoint. An authenticated remote attacker could exploit...