Show filters
222 Total Results
Displaying 11-20 of 222
Sort by:
Attacker Value
Unknown
CVE-2023-33996
Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Missing Authorization vulnerability in СleanTalk - Anti-Spam Protection Spam protection, AntiSpam, FireWall by CleanTalk allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spam protection, AntiSpam, FireWall by CleanTalk: from n/a through 6.10.
0
Attacker Value
Unknown
CVE-2024-10781
Disclosure Date: November 26, 2024 (last updated January 05, 2025)
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
0
Attacker Value
Unknown
CVE-2024-10570
Disclosure Date: November 26, 2024 (last updated January 05, 2025)
The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to unauthorized SQL Injection due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 2.145, as well as insufficient input sanitization and validation. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
0
Attacker Value
Unknown
CVE-2024-10542
Disclosure Date: November 26, 2024 (last updated January 05, 2025)
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
0
Attacker Value
Unknown
CVE-2024-10945
Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A Local Privilege Escalation vulnerability exists in the affected product. The vulnerability requires a local, low privileged threat actor to replace certain files during update and exists due to a failure to perform proper security checks before installation.
0
Attacker Value
Unknown
CVE-2024-10944
Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A Remote
Code Execution vulnerability exists in the affected product. The vulnerability requires
a high level of permissions and exists due to improper input validation resulting
in the possibility of a malicious Updated Agent being deployed.
0
Attacker Value
Unknown
CVE-2024-10943
Disclosure Date: November 12, 2024 (last updated November 13, 2024)
An
authentication bypass vulnerability exists in the affected product. The
vulnerability exists due to shared secrets across accounts and could allow a threat
actor to impersonate a user if the threat actor is able to enumerate additional
information required during authentication.
0
Attacker Value
Unknown
CVE-2024-37365
Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A remote code execution vulnerability exists in the affected
product. The vulnerability allows users to save projects within the public
directory allowing anyone with local access to modify and/or delete files. Additionally,
a malicious user could potentially leverage this vulnerability to escalate
their privileges by changing the macro to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2024-6207
Disclosure Date: October 14, 2024 (last updated October 22, 2024)
CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
0
Attacker Value
Unknown
CVE-2024-48033
Disclosure Date: October 11, 2024 (last updated October 12, 2024)
Deserialization of Untrusted Data vulnerability in Elie Burstein, Baptiste Gourdin Talkback allows Object Injection.This issue affects Talkback: from n/a through 1.0.
0