NA - CVE-2024-10820 - The WooCommerce Upload Files plugin for...
The WooCommerce Upload Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including,...
High - CVE-2024-10828 - The Advanced Order Export For WooCommerce...
The Advanced Order Export For WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.5.5 via deserialization of untrusted input during Order...
NA - CVE-2024-8933 - CWE-924: Improper Enforcement of Message...
CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel vulnerability exists that could cause retrieval of password hash that could lead to denial of...
NA - CVE-2024-10575 - CWE-862: Missing Authorization vulnerability...
CWE-862: Missing Authorization vulnerability exists that could cause unauthorized access when enabled on the network and potentially impacting connected devices.
High - CVE-2024-10800 - The WordPress User Extra Fields plugin for...
The WordPress User Extra Fields plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the ajax_save_fields() function in all versions up to, and including,...
Critical - CVE-2024-11150 - The WordPress User Extra Fields plugin for...
The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up...
NA - CVE-2024-21541 - All versions of the package dom-iterator are...
All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function...
NA - CVE-2024-8935 - CWE-290: Authentication Bypass by Spoofing...
CWE-290: Authentication Bypass by Spoofing vulnerability exists that could cause a denial of service and loss of confidentiality and integrity of controllers when conducting a Man-In-The-Middle...
NA - CVE-2024-8936 - CWE-20: Improper Input Validation vulnerability...
CWE-20: Improper Input Validation vulnerability exists that could lead to loss of confidentiality of controller memory after a successful Man-In-The-Middle attack followed by sending a crafted...