Show filters
4,812 Total Results
Displaying 351-360 of 4,812
Sort by:
Attacker Value
Unknown

CVE-2024-57611

Disclosure Date: January 16, 2025 (last updated February 27, 2025)
07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/doAdminAction.php?act=editShop&shopId.
0
Attacker Value
Unknown

CVE-2024-57161

Disclosure Date: January 16, 2025 (last updated February 25, 2025)
07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaWorkReport/edit.html
Attacker Value
Unknown

CVE-2024-57160

Disclosure Date: January 16, 2025 (last updated February 25, 2025)
07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaTask/edit.html.
Attacker Value
Unknown

CVE-2024-10789

Disclosure Date: January 16, 2025 (last updated February 27, 2025)
The WP User Profile Avatar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.5. This is due to missing or incorrect nonce validation on the wpupa_user_admin() function. This makes it possible for unauthenticated attackers to update the plugins setting which controls access to the functionality via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Attacker Value
Unknown

CVE-2025-22786

Disclosure Date: January 15, 2025 (last updated February 27, 2025)
Path Traversal vulnerability in ElementInvader ElementInvader Addons for Elementor allows PHP Local File Inclusion.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.6.
0
Attacker Value
Unknown

CVE-2025-22784

Disclosure Date: January 15, 2025 (last updated February 27, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in Johan Ström Background Control allows Path Traversal.This issue affects Background Control: from n/a through 1.0.5.
0
Attacker Value
Unknown

CVE-2025-22731

Disclosure Date: January 15, 2025 (last updated February 27, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in silverplugins217 Build Private Store For Woocommerce allows Cross Site Request Forgery.This issue affects Build Private Store For Woocommerce: from n/a through 1.0.
0
Attacker Value
Unknown

CVE-2024-13215

Disclosure Date: January 15, 2025 (last updated February 27, 2025)
The Elementor Addon Elements plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.13.10 via the 'render' function in modules/modal-popup/widgets/modal-popup.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, scheduled, and draft template data.
Attacker Value
Unknown

CVE-2024-50858

Disclosure Date: January 14, 2025 (last updated February 27, 2025)
Multiple endpoints in GestioIP v3.5.7 are vulnerable to Cross-Site Request Forgery (CSRF). An attacker can execute actions via the admin's browser by hosting a malicious URL, leading to data modification, deletion, or exfiltration.
0
Attacker Value
Unknown

CVE-2024-55945

Disclosure Date: January 14, 2025 (last updated February 27, 2025)
TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to `lax` or `none`. The vulnerability in the affected downstream component “D…
0