Show filters
36 Total Results
Displaying 11-20 of 36
Sort by:
Attacker Value
Unknown
CVE-2023-7093
Disclosure Date: December 25, 2023 (last updated January 06, 2024)
A vulnerability classified as critical has been found in KylinSoft kylin-system-updater up to 2.0.5.16-0k2.33. Affected is an unknown function of the file /usr/share/kylin-system-updater/SystemUpdater/UpgradeStrategiesDbus.py of the component com.kylin.systemupgrade Service. The manipulation of the argument SetDownloadspeedMax leads to os command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248940. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2023-41902
Disclosure Date: September 20, 2023 (last updated October 08, 2023)
An XPC misconfiguration vulnerability in CoreCode MacUpdater before 2.3.8, and 3.x before 3.1.2, allows attackers to escalate privileges by crafting malicious .pkg files.
0
Attacker Value
Unknown
CVE-2023-1277
Disclosure Date: March 08, 2023 (last updated October 21, 2023)
A vulnerability, which was classified as critical, was found in kylin-system-updater up to 1.4.20kord on Ubuntu Kylin. Affected is the function InstallSnap of the component Update Handler. The manipulation leads to command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222600.
0
Attacker Value
Unknown
CVE-2023-24454
Disclosure Date: January 26, 2023 (last updated October 25, 2023)
Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2023-24453
Disclosure Date: January 26, 2023 (last updated October 25, 2023)
A missing check in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
0
Attacker Value
Unknown
CVE-2023-24452
Disclosure Date: January 26, 2023 (last updated October 25, 2023)
A cross-site request forgery (CSRF) vulnerability in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.
0
Attacker Value
Unknown
CVE-2022-2355
Disclosure Date: August 08, 2022 (last updated October 08, 2023)
The Easy Username Updater WordPress plugin before 1.0.5 does not implement CSRF checks, which could allow attackers to make a logged in admin change any user's username includes the admin
0
Attacker Value
Unknown
CVE-2022-1791
Disclosure Date: June 13, 2022 (last updated October 07, 2023)
The One Click Plugin Updater WordPress plugin through 2.4.14 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and disable / hide the badge of the available updates and the related check.
0
Attacker Value
Unknown
CVE-2022-0503
Disclosure Date: March 14, 2022 (last updated October 07, 2023)
The WordPress Multisite Content Copier/Updater WordPress plugin before 2.1.2 does not sanitise and escape the s parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue in the network dashboard
0
Attacker Value
Unknown
CVE-2021-25039
Disclosure Date: March 07, 2022 (last updated October 07, 2023)
The WordPress Multisite Content Copier/Updater WordPress plugin before 2.1.0 does not sanitise and escape the wmcc_content_type, wmcc_source_blog and wmcc_record_per_page parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
0