Show filters
2,143 Total Results
Displaying 131-140 of 2,143
Sort by:
Attacker Value
Unknown
CVE-2024-6020
Disclosure Date: September 04, 2024 (last updated October 08, 2024)
The Sign-up Sheets WordPress plugin before 2.2.13 does not escape some generated URLs, as well as the $_SERVER['REQUEST_URI'] parameter before outputting them back in attributes, which could lead to Reflected Cross-Site Scripting.
0
Attacker Value
Unknown
CVE-2024-7692
Disclosure Date: September 02, 2024 (last updated October 05, 2024)
The Flaming Forms WordPress plugin through 1.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
0
Attacker Value
Unknown
CVE-2024-7691
Disclosure Date: September 02, 2024 (last updated October 05, 2024)
The Flaming Forms WordPress plugin through 1.0.1 does not sanitise and escape some parameters, which could allow unauthenticated users to perform Cross-Site Scripting attacks against administrators.
0
Attacker Value
Unknown
CVE-2024-8006
Disclosure Date: August 31, 2024 (last updated September 20, 2024)
Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.
0
Attacker Value
Unknown
CVE-2023-7256
Disclosure Date: August 31, 2024 (last updated September 20, 2024)
In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.
0
Attacker Value
Unknown
CVE-2024-43952
Disclosure Date: August 29, 2024 (last updated August 31, 2024)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Esotera allows Stored XSS.This issue affects Esotera: from n/a through 1.2.5.1.
0
Attacker Value
Unknown
CVE-2024-43951
Disclosure Date: August 29, 2024 (last updated August 31, 2024)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Tempera allows Stored XSS.This issue affects Tempera: from n/a through 1.8.2.
0
Attacker Value
Unknown
CVE-2024-41285
Disclosure Date: August 26, 2024 (last updated August 28, 2024)
A stack overflow in FAST FW300R v1.3.13 Build 141023 Rel.61347n allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted file path.
0
Attacker Value
Unknown
CVE-2024-39690
Disclosure Date: August 20, 2024 (last updated August 22, 2024)
Capsule is a multi-tenancy and policy-based framework for Kubernetes. In Capsule v0.7.0 and earlier, the tenant-owner can patch any arbitrary namespace that has not been taken over by a tenant (i.e., namespaces without the ownerReference field), thereby gaining control of that namespace.
0
Attacker Value
Unknown
CVE-2024-7921
Disclosure Date: August 19, 2024 (last updated August 22, 2024)
A vulnerability has been found in Anhui Deshun Intelligent Technology Jieshun JieLink+ JSOTC2016 up to 20240805 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /report/ParkOutRecord/GetDataList. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
0