Show filters
67 Total Results
Displaying 1-10 of 67
Sort by:
Attacker Value
Unknown

CVE-2024-56940

Disclosure Date: February 12, 2025 (last updated February 25, 2025)
An issue in the profile image upload function of LearnDash v6.7.1 allows attackers to cause a Denial of Service (DoS) via excessive file uploads.
Attacker Value
Unknown

CVE-2024-56939

Disclosure Date: February 12, 2025 (last updated February 25, 2025)
LearnDash v6.7.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the ld-comment-body class.
Attacker Value
Unknown

CVE-2024-56938

Disclosure Date: February 12, 2025 (last updated February 25, 2025)
LearnDash v6.7.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the materials-content class.
Attacker Value
Unknown

CVE-2025-23902

Disclosure Date: January 16, 2025 (last updated January 17, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in Taras Dashkevych Error Notification allows Cross Site Request Forgery.This issue affects Error Notification: from n/a through 0.2.7.
0
Attacker Value
Unknown

CVE-2024-12235

Disclosure Date: December 05, 2024 (last updated December 21, 2024)
A vulnerability was found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 1.0.0. It has been declared as critical. Affected by this vulnerability is the function doFilter of the file \agile-bpm-basic-master\ab-auth\ab-auth-spring-security-oauth2\src\main\java\com\dstz\auth\filter\AuthorizationTokenCheckFilter.java. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown

CVE-2024-6586

Disclosure Date: August 30, 2024 (last updated August 31, 2024)
Lightdash version 0.1024.6 allows users with the necessary permissions, such as Administrator or Editor, to create and share dashboards. A dashboard that contains HTML elements which point to a threat actor controlled source can trigger an SSRF request when exported, via a POST request to /api/v1/dashboards//export. The forged request contains the value of the exporting user’s session token. A threat actor could obtain the session token of any user who exports the dashboard. The obtained session token can be used to perform actions as the victim on the application, resulting in session takeover.
0
Attacker Value
Unknown

CVE-2024-6585

Disclosure Date: August 30, 2024 (last updated August 31, 2024)
Multiple stored cross-site scripting (“XSS”) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user’s session with the application.
0
Attacker Value
Unknown

CVE-2024-30265

Disclosure Date: April 03, 2024 (last updated April 10, 2024)
Collabora Online is a collaborative online office suite based on LibreOffice technology. Any deployment of voilà dashboard allow local file inclusion. Any file on a filesystem that is readable by the user that runs the voilà dashboard server can be downloaded by someone with network access to the server. Whether this still requires authentication depends on how voilà is deployed. This issue has been patched in 0.2.17, 0.3.8, 0.4.4 and 0.5.6.
0
Attacker Value
Unknown

CVE-2024-1210

Disclosure Date: February 05, 2024 (last updated February 15, 2024)
The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via API. This makes it possible for unauthenticated attackers to obtain access to quizzes.
Attacker Value
Unknown

CVE-2024-1209

Disclosure Date: February 05, 2024 (last updated February 15, 2024)
The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via direct file access due to insufficient protection of uploaded assignments. This makes it possible for unauthenticated attackers to obtain those uploads.