Show filters
1,064 Total Results
Displaying 111-120 of 1,064
Sort by:
Attacker Value
Unknown

CVE-2024-39460

Disclosure Date: June 26, 2024 (last updated February 26, 2025)
Jenkins Bitbucket Branch Source Plugin 886.v44cf5e4ecec5 and earlier prints the Bitbucket OAuth access token as part of the Bitbucket URL in the build log in some cases.
0
Attacker Value
Unknown

CVE-2024-6257

Disclosure Date: June 25, 2024 (last updated February 26, 2025)
HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution.
0
Attacker Value
Unknown

CVE-2024-3249

Disclosure Date: June 25, 2024 (last updated January 05, 2025)
The Zita Elementor Site Library plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_xml_data, xml_data_import, import_option_data, import_widgets, and import_customizer_settings functions in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to create pages, update certain options, including WooCommerce page titles and Elementor settings, import widgets, and update the plugin's customizer settings and the WordPress custom CSS. NOTE: This vulnerability was partially fixed in version 1.6.2.
0
Attacker Value
Unknown

CVE-2024-5191

Disclosure Date: June 21, 2024 (last updated February 26, 2025)
The Branda – White Label WordPress, Custom Login Page Customizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘mime_types’ parameter in all versions up to, and including, 3.4.17 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2024-5605

Disclosure Date: June 20, 2024 (last updated February 26, 2025)
The Media Library Assistant plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter within the mla_tag_cloud Shortcode in all versions up to, and including, 3.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Attacker Value
Unknown

CVE-2024-2023

Disclosure Date: June 14, 2024 (last updated January 05, 2025)
The Folders and Folders Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.0 in Folders and 3.0.2 in Folders Pro via the 'handle_folders_file_upload' function. This makes it possible for authenticated attackers, with author access and above, to upload files to arbitrary locations on the server.
0
Attacker Value
Unknown

CVE-2024-35255

Disclosure Date: June 11, 2024 (last updated February 26, 2025)
Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2024-35252

Disclosure Date: June 11, 2024 (last updated February 26, 2025)
Azure Storage Movement Client Library Denial of Service Vulnerability
Attacker Value
Unknown

CVE-2024-35687

Disclosure Date: June 08, 2024 (last updated February 26, 2025)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library link-library allows Reflected XSS.This issue affects Link Library: from n/a through 7.6.3.
Attacker Value
Unknown

CVE-2024-2914

Disclosure Date: June 06, 2024 (last updated February 26, 2025)
A TarSlip vulnerability exists in the deepjavalibrary/djl, affecting version 0.26.0 and fixed in version 0.27.0. This vulnerability allows an attacker to manipulate file paths within tar archives to overwrite arbitrary files on the target system. Exploitation of this vulnerability could lead to remote code execution, privilege escalation, data theft or manipulation, and denial of service. The vulnerability is due to improper validation of file paths during the extraction of tar files, as demonstrated in multiple occurrences within the library's codebase, including but not limited to the files_util.py and extract_imagenet.py scripts.