Show filters
4,812 Total Results
Displaying 351-360 of 4,812
Sort by:
Attacker Value
Unknown
CVE-2024-57611
Disclosure Date: January 16, 2025 (last updated February 27, 2025)
07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/doAdminAction.php?act=editShop&shopId.
0
Attacker Value
Unknown
CVE-2024-57161
Disclosure Date: January 16, 2025 (last updated February 25, 2025)
07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaWorkReport/edit.html
0
Attacker Value
Unknown
CVE-2024-57160
Disclosure Date: January 16, 2025 (last updated February 25, 2025)
07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaTask/edit.html.
0
Attacker Value
Unknown
CVE-2024-10789
Disclosure Date: January 16, 2025 (last updated February 27, 2025)
The WP User Profile Avatar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.5. This is due to missing or incorrect nonce validation on the wpupa_user_admin() function. This makes it possible for unauthenticated attackers to update the plugins setting which controls access to the functionality via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
0
Attacker Value
Unknown
CVE-2025-22786
Disclosure Date: January 15, 2025 (last updated February 27, 2025)
Path Traversal vulnerability in ElementInvader ElementInvader Addons for Elementor allows PHP Local File Inclusion.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.6.
0
Attacker Value
Unknown
CVE-2025-22784
Disclosure Date: January 15, 2025 (last updated February 27, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in Johan Ström Background Control allows Path Traversal.This issue affects Background Control: from n/a through 1.0.5.
0
Attacker Value
Unknown
CVE-2025-22731
Disclosure Date: January 15, 2025 (last updated February 27, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in silverplugins217 Build Private Store For Woocommerce allows Cross Site Request Forgery.This issue affects Build Private Store For Woocommerce: from n/a through 1.0.
0
Attacker Value
Unknown
CVE-2024-13215
Disclosure Date: January 15, 2025 (last updated February 27, 2025)
The Elementor Addon Elements plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.13.10 via the 'render' function in modules/modal-popup/widgets/modal-popup.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, scheduled, and draft template data.
0
Attacker Value
Unknown
CVE-2024-50858
Disclosure Date: January 14, 2025 (last updated February 27, 2025)
Multiple endpoints in GestioIP v3.5.7 are vulnerable to Cross-Site Request Forgery (CSRF). An attacker can execute actions via the admin's browser by hosting a malicious URL, leading to data modification, deletion, or exfiltration.
0
Attacker Value
Unknown
CVE-2024-55945
Disclosure Date: January 14, 2025 (last updated February 27, 2025)
TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to `lax` or `none`. The vulnerability in the affected downstream component “D…
0