High - CVE-2024-12810 - The JobCareer | Job Board Responsive WordPress...
The JobCareer | Job Board Responsive WordPress Theme theme for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability checks on multiple...
The Civi - Job Board & Freelance Marketplace WordPress Theme plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.1.4. This is due to a lack of user...
Medium - CVE-2024-13772 - The Civi - Job Board & Freelance Marketplace...
The Civi - Job Board & Freelance Marketplace WordPress Theme plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.1.4. This is due to a lack of...
High - CVE-2024-13773 - The Civi - Job Board & Freelance Marketplace...
The Civi - Job Board & Freelance Marketplace WordPress Theme plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4 via hard-coded...
Critical - CVE-2025-2232 - The Realteo - Real Estate Plugin by Purethemes...
The Realteo - Real Estate Plugin by Purethemes plugin for WordPress, used by the Findeo Theme, is vulnerable to authentication bypass in all versions up to, and including, 1.2.8. This is due to...
NA - CVE-2025-26626 - The GLPI Inventory Plugin handles various types...
The GLPI Inventory Plugin handles various types of tasks for GLPI agents for the GLPI asset and IT management software package. Versions prior to 1.5.0 are vulnerable to reflective cross-site...
NA - CVE-2025-27593 - The product can be used to distribute malicious...
The product can be used to distribute malicious code using SDD Device Drivers due to missing download verification checks, leading to code execution on target systems.
NA - CVE-2025-27594 - The device uses an unencrypted, proprietary...
The device uses an unencrypted, proprietary protocol for communication. Through this protocol, configuration data is transmitted and device authentication is performed. An attacker can thereby...
NA - CVE-2025-27595 - The device uses a weak hashing alghorithm to...
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
Critical - CVE-2025-2000 - A maliciously crafted QPY file can potential...
A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0...