Known Vulnerabilities for Action View by Action View Project

Listed below are 1 of the newest known vulnerabilities associated with "Action View" by "Action View Project".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-33168 json Action View provides conventions and helpers for building web pages with the Rails framework. Prior to versions 8.1.2.1, 8.0.... Not Provided 2026-03-23 2026-03-24
CVE-2026-28503 json Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6... Not Provided 2026-03-26 2026-03-27
CVE-2026-26460 json A HTML Injection vulnerability exists in the Dashboard module of Vtiger CRM 8.4.0. The application fails to properly neutrali... Not Provided 2026-04-13 2026-04-15
CVE-2026-4666 json The wpForo Forum plugin for WordPress is vulnerable to unauthorized modification of data due to the use of `extract($args, EX... Not Provided 2026-04-17 2026-04-20
CVE-2026-1307 json The Ninja Forms - The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Sensitive Information Ex... Not Provided 2026-03-28 2026-03-30
CVE-2024-9821 json The Bot for Telegram on WooCommerce plugin for WordPress is vulnerable to sensitive information disclosure due to missing aut... Not Provided 2024-10-12 2026-04-08
CVE-2024-5343 json The Photo Gallery, Images, Slider in Rbs Image Gallery plugin for WordPress is vulnerable to Cross-Site Request Forgery in al... Not Provided 2024-06-19 2026-04-08
CVE-2024-2036 json The ApplyOnline – Application Form Builder and Manager plugin for WordPress is vulnerable to unauthorized access of data du... Not Provided 2024-05-22 2026-04-08
CVE-2024-0592 json The Related Posts for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and i... Not Provided 2024-03-13 2026-04-08
CVE-2024-0366 json The Starbox – the Author Box for Humans plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versi... Not Provided 2024-02-05 2026-04-08

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationAction View ProjectAction View6.1.0
ApplicationAction View ProjectAction View6.1.0
ApplicationAction View ProjectAction View6.1.0
ApplicationAction View ProjectAction View6.0.3.4
ApplicationAction View ProjectAction View6.0.3.3
ApplicationAction View ProjectAction View6.0.3.2
ApplicationAction View ProjectAction View6.0.3.1
ApplicationAction View ProjectAction View6.0.3
ApplicationAction View ProjectAction View6.0.3
ApplicationAction View ProjectAction View6.0.2.2
ApplicationAction View ProjectAction View6.0.2.1
ApplicationAction View ProjectAction View6.0.2
ApplicationAction View ProjectAction View6.0.2
ApplicationAction View ProjectAction View6.0.2
ApplicationAction View ProjectAction View6.0.1
ApplicationAction View ProjectAction View6.0.1
ApplicationAction View ProjectAction View6.0.0
ApplicationAction View ProjectAction View6.0.0
ApplicationAction View ProjectAction View6.0.0
ApplicationAction View ProjectAction View6.0.0
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report