Show filters
325,667 Total Results
Displaying 1,051-1,060 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2024-21545

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
Proxmox Virtual Environment is an open-source server management platform for enterprise virtualization. Insufficient safeguards against malicious API response values allow authenticated attackers with 'Sys.Audit' or 'VM.Monitor' privileges to download arbitrary host files via the API. When handling the result from a request handler before returning it to the user, the handle_api2_request function will check for the ‘download’ or ‘data’->’download’ objects inside the request handler call response object. If present, handle_api2_request will read a local file defined by this object and return it to the user. Two endpoints were identified which can control the object returned by a request handler sufficiently that the ’download’ object is defined and user controlled. This results in arbitrary file read. The privileges of this file read can result in full compromise of the system by various impacts such as disclosing sensitive files allowing for privileged session forgery.
0
Attacker Value
Unknown

CVE-2023-5359

Disclosure Date: September 25, 2024 (last updated October 01, 2024)
The W3 Total Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.5 via Google OAuth API secrets stored in plaintext in the publicly visible plugin source. This can allow unauthenticated attackers to impersonate W3 Total Cache and gain access to user account information in successful conditions. This would not impact the WordPress users site in any way.
Attacker Value
Unknown

CVE-2023-26691

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
Directory Traversal vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via crafted zip file when installing a new add-on.
0
Attacker Value
Unknown

CVE-2023-26690

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
File Upload vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via File Manager/Editor component in the vendor or admin menu.
0
Attacker Value
Unknown

CVE-2023-26689

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
An issue discovered in CS-Cart MultiVendor 4.16.1 allows attackers to alter arbitrary user account profiles via crafted post request.
0
Attacker Value
Unknown

CVE-2023-26688

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
Cross Site Scripting (XSS) vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via the product_data parameter of add/edit product in the administration interface.
0
Attacker Value
Unknown

CVE-2023-26687

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
Directory Traversal vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to obtain sensitive information via the product_data parameter in the PDF Add-on.
0
Attacker Value
Unknown

CVE-2023-26686

Disclosure Date: September 25, 2024 (last updated September 25, 2024)
File Upload vulnerability in CS-Cart MultiVendor 4.16.1 allows remote attackers to run arbitrary code via the image upload feature when customizing a shop.
0
Attacker Value
Unknown

CVE-2022-43845

Disclosure Date: September 25, 2024 (last updated October 01, 2024)
IBM Aspera Console 3.4.0 through 3.4.4 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie.
Attacker Value
Unknown

CVE-2021-38963

Disclosure Date: September 25, 2024 (last updated October 01, 2024)
IBM Aspera Console 3.4.0 through 3.4.4 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a CSV injection vulnerability. By persuading a victim to open a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.