Show filters
154 Total Results
Displaying 11-20 of 154
Sort by:
Attacker Value
Unknown

CVE-2020-11023

Disclosure Date: April 29, 2020 (last updated November 08, 2023)
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Attacker Value
Low

CVE-2020-7065

Disclosure Date: March 17, 2020 (last updated November 27, 2024)
In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.
Attacker Value
Unknown

CVE-2024-12494

Disclosure Date: January 24, 2025 (last updated February 06, 2025)
The BMLT Meeting Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bmlt_meeting_map' shortcode in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2024-13593

Disclosure Date: January 23, 2025 (last updated February 05, 2025)
The BMLT Meeting Map plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.6.0 via the 'bmlt_meeting_map' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Attacker Value
Unknown

CVE-2024-12174

Disclosure Date: December 09, 2024 (last updated December 21, 2024)
An Improper Certificate Validation vulnerability exists in Tenable Security Center where an authenticated, privileged attacker could intercept email messages sent from Security Center via a rogue SMTP server.
0
Attacker Value
Unknown

CVE-2024-9158

Disclosure Date: September 30, 2024 (last updated October 08, 2024)
A stored cross site scripting vulnerability exists in Nessus Network Monitor where an authenticated, privileged local attacker could inject arbitrary code into the NNM UI via the local CLI.
Attacker Value
Unknown

CVE-2024-3232

Disclosure Date: July 16, 2024 (last updated July 17, 2024)
A formula injection vulnerability exists in Tenable Identity Exposure where an authenticated remote attacker with administrative privileges could manipulate application form fields in order to trick another administrator into executing CSV payloads. - CVE-2024-3232
0
Attacker Value
Unknown

CVE-2024-5759

Disclosure Date: June 12, 2024 (last updated July 20, 2024)
An improper privilege management vulnerability exists in Tenable Security Center where an authenticated, remote attacker could view unauthorized objects and launch scans without having the required privileges
Attacker Value
Unknown

CVE-2024-1891

Disclosure Date: June 12, 2024 (last updated August 24, 2024)
A stored cross site scripting vulnerability exists in Tenable Security Center where an authenticated, remote attacker could inject HTML code into a web application scan result page.
Attacker Value
Unknown

CVE-2024-3292

Disclosure Date: May 17, 2024 (last updated May 18, 2024)
A race condition vulnerability exists where an authenticated, local attacker on a Windows Nessus Agent host could modify installation parameters at installation time, which could lead to the execution of arbitrary code on the Nessus host. - CVE-2024-3292
0