Show filters
322 Total Results
Displaying 11-20 of 322
Sort by:
Attacker Value
Unknown

CVE-2024-11834

Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PlexTrac allows arbitrary file writes.This issue affects PlexTrac: from 1.61.3 before 2.8.1.
0
Attacker Value
Unknown

CVE-2024-11833

Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PlexTrac allows arbitrary file writes.This issue affects PlexTrac: from 1.61.3 before 2.8.1.
0
Attacker Value
Unknown

CVE-2024-54002

Disclosure Date: December 04, 2024 (last updated December 21, 2024)
Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Performing a login request against the /api/v1/user/login endpoint with a username that exist in the system takes significantly longer than performing the same action with a username that is not known by the system. The observable difference in request duration can be leveraged by actors to enumerate valid names of managed users. LDAP and OpenID Connect users are not affected. The issue has been fixed in Dependency-Track 4.12.2.
0
Attacker Value
Unknown

CVE-2024-7746

Disclosure Date: August 13, 2024 (last updated August 23, 2024)
Use of Default Credentials vulnerability in Tananaev Solutions Traccar Server on Administrator Panel modules allows Authentication Abuse.This issue affects the privileged transactions implemented by the Traccar solution that should otherwise be protected by the authentication mechanism.  These transactions could have an impact on any sensitive aspect of the platform, including Confidentiality, Integrity and Availability.
Attacker Value
Unknown

CVE-2024-41805

Disclosure Date: July 26, 2024 (last updated July 28, 2024)
Tracks, a Getting Things Done (GTD) web application, is vulnerable to reflected cross-site scripting in versions prior to 2.7.1. Reflected cross-site scripting enables execution of malicious JavaScript in the context of a user’s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential theft. Tracks version 2.7.1 is patched. No known complete workarounds are available.
0
Attacker Value
Unknown

CVE-2024-39126

Disclosure Date: July 17, 2024 (last updated August 03, 2024)
Roundup before 2.4.0 allows XSS via JavaScript in PDF, XML, and SVG documents.
Attacker Value
Unknown

CVE-2024-39125

Disclosure Date: July 17, 2024 (last updated August 03, 2024)
Roundup before 2.4.0 allows XSS via a SCRIPT element in an HTTP Referer header.
Attacker Value
Unknown

CVE-2024-39124

Disclosure Date: July 17, 2024 (last updated August 03, 2024)
In Roundup before 2.4.0, classhelpers (_generic.help.html) allow XSS.
Attacker Value
Unknown

CVE-2024-34431

Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP-etracker WP etracker allows Reflected XSS.This issue affects WP etracker: from n/a through 1.0.2.
0
Attacker Value
Unknown

CVE-2024-32678

Disclosure Date: April 24, 2024 (last updated April 25, 2024)
Missing Authorization vulnerability in TrackShip TrackShip for WooCommerce.This issue affects TrackShip for WooCommerce: from n/a through 1.7.5.
0