Show filters
322 Total Results
Displaying 11-20 of 322
Sort by:
Attacker Value
Unknown
CVE-2024-11834
Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PlexTrac allows arbitrary file writes.This issue affects PlexTrac: from 1.61.3 before 2.8.1.
0
Attacker Value
Unknown
CVE-2024-11833
Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PlexTrac allows arbitrary file writes.This issue affects PlexTrac: from 1.61.3 before 2.8.1.
0
Attacker Value
Unknown
CVE-2024-54002
Disclosure Date: December 04, 2024 (last updated December 21, 2024)
Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Performing a login request against the /api/v1/user/login endpoint with a username that exist in the system takes significantly longer than performing the same action with a username that is not known by the system. The observable difference in request duration can be leveraged by actors to enumerate valid names of managed users. LDAP and OpenID Connect users are not affected. The issue has been fixed in Dependency-Track 4.12.2.
0
Attacker Value
Unknown
CVE-2024-7746
Disclosure Date: August 13, 2024 (last updated August 23, 2024)
Use of Default Credentials vulnerability in Tananaev Solutions Traccar Server on Administrator Panel modules allows Authentication Abuse.This issue affects the privileged transactions implemented by the Traccar solution that should otherwise be protected by the authentication mechanism.
These transactions could have an impact on any sensitive aspect of the platform, including Confidentiality, Integrity and Availability.
0
Attacker Value
Unknown
CVE-2024-41805
Disclosure Date: July 26, 2024 (last updated July 28, 2024)
Tracks, a Getting Things Done (GTD) web application, is vulnerable to reflected cross-site scripting in versions prior to 2.7.1. Reflected cross-site scripting enables execution of malicious JavaScript in the context of a user’s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential theft. Tracks version 2.7.1 is patched. No known complete workarounds are available.
0
Attacker Value
Unknown
CVE-2024-39126
Disclosure Date: July 17, 2024 (last updated August 03, 2024)
Roundup before 2.4.0 allows XSS via JavaScript in PDF, XML, and SVG documents.
0
Attacker Value
Unknown
CVE-2024-39125
Disclosure Date: July 17, 2024 (last updated August 03, 2024)
Roundup before 2.4.0 allows XSS via a SCRIPT element in an HTTP Referer header.
0
Attacker Value
Unknown
CVE-2024-39124
Disclosure Date: July 17, 2024 (last updated August 03, 2024)
In Roundup before 2.4.0, classhelpers (_generic.help.html) allow XSS.
0
Attacker Value
Unknown
CVE-2024-34431
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP-etracker WP etracker allows Reflected XSS.This issue affects WP etracker: from n/a through 1.0.2.
0
Attacker Value
Unknown
CVE-2024-32678
Disclosure Date: April 24, 2024 (last updated April 25, 2024)
Missing Authorization vulnerability in TrackShip TrackShip for WooCommerce.This issue affects TrackShip for WooCommerce: from n/a through 1.7.5.
0