Show filters
784 Total Results
Displaying 71-80 of 784
Sort by:
Attacker Value
Unknown
CVE-2022-32560
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
An issue was discovered in Couchbase Server before 7.0.4. XDCR lacks role checking when changing internal settings.
0
Attacker Value
Unknown
CVE-2022-31752
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality.
0
Attacker Value
Unknown
CVE-2022-1777
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Filr WordPress plugin before 1.2.2.1 does not have authorisation check in two of its AJAX actions, allowing them to be called by any authenticated users, such as subscriber. They are are protected with a nonce, however the nonce is leaked on the dashboard. This could allow them to upload arbitrary HTML files as well as delete all files or arbitrary ones.
0
Attacker Value
Unknown
CVE-2022-0885
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Member Hero WordPress plugin through 1.0.9 lacks authorization checks, and does not validate the a request parameter in an AJAX action, allowing unauthenticated users to call arbitrary PHP functions with no arguments.
0
Attacker Value
Unknown
CVE-2022-0745
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Like Button Rating WordPress plugin before 2.6.45 allows any logged-in user, such as subscriber, to send arbitrary e-mails to any recipient, with any subject and body
0
Attacker Value
Unknown
CVE-2021-25116
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Enqueue Anything WordPress plugin through 1.0.1 does not have authorisation and CSRF checks in the remove_asset AJAX action, and does not ensure that the item to be deleted is actually an asset. As a result, low privilege users such as subscriber could delete arbitrary assets, as well as put arbitrary posts in the trash.
0
Attacker Value
Unknown
CVE-2022-24896
Disclosure Date: June 09, 2022 (last updated February 23, 2025)
Tuleap is a Free & Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports.
0
Attacker Value
Unknown
CVE-2022-1570
Disclosure Date: June 08, 2022 (last updated February 23, 2025)
The Files Download Delay WordPress plugin before 1.0.7 does not have authorisation and CSRF checks when reseting its settings, which could allow any authenticated users, such as subscriber to perform such action.
0
Attacker Value
Unknown
CVE-2022-30746
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
Missing caller check in Smart Things prior to version 1.7.85.12 allows attacker to access senstive information remotely using javascript interface API.
0
Attacker Value
Unknown
CVE-2022-30731
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
Improper access control vulnerability in My Files prior to version 13.1.00.193 allows attackers to access arbitrary private files in My Files application.
0