Show filters
222 Total Results
Displaying 11-20 of 222
Sort by:
Attacker Value
Unknown

CVE-2023-33996

Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Missing Authorization vulnerability in СleanTalk - Anti-Spam Protection Spam protection, AntiSpam, FireWall by CleanTalk allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spam protection, AntiSpam, FireWall by CleanTalk: from n/a through 6.10.
0
Attacker Value
Unknown

CVE-2024-10781

Disclosure Date: November 26, 2024 (last updated January 05, 2025)
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
0
Attacker Value
Unknown

CVE-2024-10570

Disclosure Date: November 26, 2024 (last updated January 05, 2025)
The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to unauthorized SQL Injection due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 2.145, as well as insufficient input sanitization and validation. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
0
Attacker Value
Unknown

CVE-2024-10542

Disclosure Date: November 26, 2024 (last updated January 05, 2025)
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
0
Attacker Value
Unknown

CVE-2024-10945

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A Local Privilege Escalation vulnerability exists in the affected product. The vulnerability requires a local, low privileged threat actor to replace certain files during update and exists due to a failure to perform proper security checks before installation.
0
Attacker Value
Unknown

CVE-2024-10944

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A Remote Code Execution vulnerability exists in the affected product. The vulnerability requires a high level of permissions and exists due to improper input validation resulting in the possibility of a malicious Updated Agent being deployed.
0
Attacker Value
Unknown

CVE-2024-10943

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
An authentication bypass vulnerability exists in the affected product. The vulnerability exists due to shared secrets across accounts and could allow a threat actor to impersonate a user if the threat actor is able to enumerate additional information required during authentication.
0
Attacker Value
Unknown

CVE-2024-37365

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A remote code execution vulnerability exists in the affected product. The vulnerability allows users to save projects within the public directory allowing anyone with local access to modify and/or delete files. Additionally, a malicious user could potentially leverage this vulnerability to escalate their privileges by changing the macro to execute arbitrary code.
0
Attacker Value
Unknown

CVE-2024-6207

Disclosure Date: October 14, 2024 (last updated October 22, 2024)
CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
Attacker Value
Unknown

CVE-2024-48033

Disclosure Date: October 11, 2024 (last updated October 12, 2024)
Deserialization of Untrusted Data vulnerability in Elie Burstein, Baptiste Gourdin Talkback allows Object Injection.This issue affects Talkback: from n/a through 1.0.
0