Show filters
1,377 Total Results
Displaying 151-160 of 1,377
Sort by:
Attacker Value
Unknown
CVE-2023-2716
Disclosure Date: May 20, 2023 (last updated February 25, 2025)
The Groundhogg plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'ajax_upload_file' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload a file to the contact, and then lists all the other uploaded files related to the contact.
0
Attacker Value
Unknown
CVE-2023-2715
Disclosure Date: May 20, 2023 (last updated February 25, 2025)
The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'submit_ticket' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers to create a support ticket that sends the website's data to the plugin developer, and it is also possible to create an admin access with an auto login link that is also sent to the plugin developer with the ticket. It only works if the plugin is activated with a valid license.
0
Attacker Value
Unknown
CVE-2023-2714
Disclosure Date: May 20, 2023 (last updated February 25, 2025)
The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'check_license' functions in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change the license key and support license key, but it can only be changed to a valid license key.
0
Attacker Value
Unknown
CVE-2023-28623
Disclosure Date: May 19, 2023 (last updated February 25, 2025)
Zulip is an open-source team collaboration tool with unique topic-based threading. In the event that 1: `ZulipLDAPAuthBackend` and an external authentication backend (any aside of `ZulipLDAPAuthBackend` and `EmailAuthBackend`) are the only ones enabled in `AUTHENTICATION_BACKENDS` in `/etc/zulip/settings.py` and 2: The organization permissions don't require invitations to join. An attacker can create a new account in the organization with an arbitrary email address in their control that's not in the organization's LDAP directory. The impact is limited to installations which have this specific combination of authentication backends as described above in addition to having `Invitations are required for joining this organization` organization permission disabled. This issue has been addressed in version 6.2. Users are advised to upgrade. Users unable to upgrade may enable the `Invitations are required for joining this organization` organization permission to prevent this issue.
0
Attacker Value
Unknown
CVE-2023-32677
Disclosure Date: May 19, 2023 (last updated February 25, 2025)
Zulip is an open-source team collaboration tool with unique topic-based threading. Zulip administrators can configure Zulip to limit who can add users to streams, and separately to limit who can invite users to the organization. In Zulip Server 6.1 and below, the UI which allows a user to invite a new user also allows them to set the streams that the new user is invited to -- even if the inviting user would not have permissions to add an existing user to streams. While such a configuration is likely rare in practice, the behavior does violate security-related controls. This does not let a user invite new users to streams they cannot see, or would not be able to add users to if they had that general permission. This issue has been addressed in version 6.2. Users are advised to upgrade. Users unable to upgrade may limit sending of invitations down to users who also have the permission to add users to streams.
0
Attacker Value
Unknown
CVE-2023-20726
Disclosure Date: May 15, 2023 (last updated February 24, 2025)
In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only).
0
Attacker Value
Unknown
CVE-2023-2590
Disclosure Date: May 09, 2023 (last updated February 24, 2025)
Missing Authorization in GitHub repository answerdev/answer prior to 1.0.9.
0
Attacker Value
Unknown
CVE-2023-32112
Disclosure Date: May 09, 2023 (last updated February 24, 2025)
Vendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to access some of its function. This could lead to modification of data impacting the integrity of the system.
0
Attacker Value
Unknown
CVE-2022-48388
Disclosure Date: May 09, 2023 (last updated February 24, 2025)
In powerEx service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
0
Attacker Value
Unknown
CVE-2022-48384
Disclosure Date: May 09, 2023 (last updated February 24, 2025)
In srtd service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
0