Show filters
335,128 Total Results
Displaying 91-100 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2024-11404

Disclosure Date: November 20, 2024 (last updated November 21, 2024)
Unrestricted Upload of File with Dangerous Type, Improper Input Validation, Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in django CMS Association django Filer allows Input Data Manipulation, Stored XSS.This issue affects django Filer: from 3 before 3.3.
Attacker Value
Unknown

CVE-2024-10520

Disclosure Date: November 20, 2024 (last updated November 21, 2024)
The WP Project Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check in the 'check' method of the 'Create_Milestone', 'Create_Task_List', 'Create_Task', and 'Delete_Task' classes in version 2.6.14. This makes it possible for unauthenticated attackers to create milestones, create task lists, create tasks, or delete tasks in any project. NOTE: Version 2.6.14 implemented a partial fix for this vulnerability.
Attacker Value
Unknown

CVE-2024-48899

Disclosure Date: November 20, 2024 (last updated November 20, 2024)
A vulnerability was found in Moodle. Additional checks are required to ensure users can only fetch the list of course badges for courses that they are intended to have access to.
0
Attacker Value
Unknown

CVE-2024-45691

Disclosure Date: November 20, 2024 (last updated November 20, 2024)
A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to "magic hash" values.
0
Attacker Value
Unknown

CVE-2024-45690

Disclosure Date: November 20, 2024 (last updated November 20, 2024)
A flaw was found in Moodle. Additional checks were required to ensure users can only delete their OAuth2-linked accounts.
0
Attacker Value
Unknown

CVE-2024-45689

Disclosure Date: November 20, 2024 (last updated November 20, 2024)
A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access.
0
Attacker Value
Unknown

CVE-2024-10872

Disclosure Date: November 20, 2024 (last updated November 20, 2024)
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `template-post-custom-field` block in all versions up to, and including, 2.0.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2024-10382

Disclosure Date: November 20, 2024 (last updated November 26, 2024)
There exists a code execution vulnerability in the Car App Android Jetpack Library. CarAppService uses deserialization logic that allows construction of arbitrary java classes. This can lead to arbitrary code execution when combined with specific Java deserialization gadgets. An attacker needs to install a malicious application on victims device to be able to attack any application that uses vulnerable library. We recommend upgrading the library past version 1.7.0-beta02.
0
Attacker Value
Unknown

CVE-2024-11494

Disclosure Date: November 20, 2024 (last updated November 20, 2024)
**UNSUPPORTED WHEN ASSIGNED** The improper authentication vulnerability in the Zyxel P-6101C ADSL modem firmware version P-6101CSA6AP_20140331 could allow an unauthenticated attacker to read some device information via a crafted HTTP HEAD method.
Attacker Value
Unknown

CVE-2024-11179

Disclosure Date: November 20, 2024 (last updated November 20, 2024)
The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to SQL Injection via the 'status_type' parameter in all versions up to, and including, 4.15.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.