Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2022-4974

Disclosure Date: October 16, 2024 (last updated October 16, 2024)
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
Attacker Value
Unknown

CVE-2023-33231

Disclosure Date: July 18, 2023 (last updated February 25, 2025)
XSS attack was possible in DPA 2023.2 due to insufficient input validation
Attacker Value
Unknown

CVE-2023-23837

Disclosure Date: April 25, 2023 (last updated February 24, 2025)
No exception handling vulnerability which revealed sensitive or excessive information to users.
Attacker Value
Unknown

CVE-2023-23838

Disclosure Date: April 25, 2023 (last updated February 24, 2025)
Directory traversal and file enumeration vulnerability which allowed users to enumerate to different folders of the server.
Attacker Value
Unknown

CVE-2022-38112

Disclosure Date: January 18, 2023 (last updated February 24, 2025)
In DPA 2022.4 and older releases, generated heap memory dumps contain sensitive information in cleartext.
Attacker Value
Unknown

CVE-2022-38110

Disclosure Date: January 18, 2023 (last updated February 24, 2025)
In Database Performance Analyzer (DPA) 2022.4 and older releases, certain URL vectors are susceptible to authenticated reflected cross-site scripting.
Attacker Value
Unknown

CVE-2021-35229

Disclosure Date: April 20, 2022 (last updated February 23, 2025)
Cross-site scripting vulnerability is present in Database Performance Monitor 2022.1.7779 and previous versions when using a complex SQL query
Attacker Value
Unknown

CVE-2021-35228

Disclosure Date: October 19, 2021 (last updated February 23, 2025)
This vulnerability occurred due to missing input sanitization for one of the output fields that is extracted from headers on specific section of page causing a reflective cross site scripting attack. An attacker would need to perform a Man in the Middle attack in order to change header for a remote victim.
Attacker Value
Unknown

CVE-2021-22883

Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
Attacker Value
Unknown

CVE-2021-22884

Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.