CVE-2024-5667 – WordPress Featherlight.js Stored Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2024-5667 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-13839 – WordPress Staff Directory Plugin Reflected Cross-Site Scripting
The following table lists the changes that have been made to the CVE-2024-13839 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-13815 – Listinggo WordPress Shortcode Execution Vulnerability
The following table lists the changes that have been made to the CVE-2024-13815 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-13811 – Lafka – Multi Store Burger – Pizza & Food Delivery WooCommerce Theme Unauthenticated AJAX Action Vulnerability
The following table lists the changes that have been made to the CVE-2024-13811 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-13810 – Zass WooCommerce Theme Unauthenticated AJAX Injection
The following table lists the changes that have been made to the CVE-2024-13810 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-13809 – “Hero Slider WordPress Slider Plugin SQL Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2024-13809 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-13787 – Veda WordPress Theme PHP Object Injection Vulnerability
The VEDA – MultiPurpose WordPress Theme theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.2 via deserialization of untrusted input in the ‘veda_backup_and_restore_action’ function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present […]
CVE-2024-13779 – Hero Mega Menu WordPress Menu Plugin Reflected Cross-Site Scripting
The following table lists the changes that have been made to the CVE-2024-13779 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-13780 – Hero Mega Menu WordPress Menu Plugin File Deletion Vulnerability
The following table lists the changes that have been made to the CVE-2024-13780 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-13778 – Hero Mega Menu – WordPress SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2024-13778 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.