Show filters
1,713 Total Results
Displaying 191-200 of 1,713
Sort by:
Attacker Value
Unknown

CVE-2024-1176

Disclosure Date: March 13, 2024 (last updated April 01, 2024)
The HT Easy GA4 – Google Analytics WordPress Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the login() function in all versions up to, and including, 1.1.5. This makes it possible for unauthenticated attackers to update the email associated through the plugin with GA4.
0
Attacker Value
Unknown

CVE-2023-43318

Disclosure Date: March 06, 2024 (last updated March 13, 2024)
TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests.
Attacker Value
Unknown

CVE-2024-2188

Disclosure Date: March 05, 2024 (last updated March 06, 2024)
Cross-Site Scripting (XSS) vulnerability stored in TP-Link Archer AX50 affecting firmware version 1.0.11 build 2022052. This vulnerability could allow an unauthenticated attacker to create a port mapping rule via a SOAP request and store a malicious JavaScript payload within that rule, which could result in an execution of the JavaScript payload when the rule is loaded.
0
Attacker Value
Unknown

CVE-2024-0765

Disclosure Date: March 03, 2024 (last updated January 12, 2025)
As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state. This would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured.
Attacker Value
Unknown

CVE-2024-0795

Disclosure Date: March 02, 2024 (last updated January 22, 2025)
If an attacked was given access to an instance with the admin or manager role there is no backend authentication that would prevent the attacked from creating a new user with an `admin` role and then be able to use this new account to have elevated privileges on the instance
Attacker Value
Unknown

CVE-2024-25712

Disclosure Date: February 29, 2024 (last updated January 17, 2025)
http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploaded (via httpSwagger.WrapHandler and *webdav.memFile) can subsequently be accessed via a GET request. NOTE: this is independently fixable with respect to CVE-2022-24863, because (if a solution continued to allow PUT requests) large files could have been blocked without blocking JavaScript, or JavaScript could have been blocked without blocking large files.
Attacker Value
Unknown

CVE-2024-1719

Disclosure Date: February 28, 2024 (last updated February 28, 2024)
The Easy PayPal & Stripe Buy Now Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.8.3 and in Contact Form 7 – PayPal & Stripe Add-on all versions up to, and including 2.1. This is due to missing or incorrect nonce validation on the 'wpecpp_stripe_connect_completion' function. This makes it possible for unauthenticated attackers to modify the plugins settings and chance the stripe connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
0
Attacker Value
Unknown

CVE-2024-0550

Disclosure Date: February 28, 2024 (last updated January 12, 2025)
A user who is privileged already `manager` or `admin` can set their profile picture via the frontend API using a relative filepath to then user the PFP GET API to download any valid files. The attacker would have to have been granted privileged permissions to the system before executing this attack.
Attacker Value
Unknown

CVE-2024-0763

Disclosure Date: February 27, 2024 (last updated February 28, 2024)
Any user can delete an arbitrary folder (recursively) on a remote server due to bad input sanitization leading to path traversal. The attacker would need access to the server at some privilege level since this endpoint is protected and requires authorization.
0
Attacker Value
Unknown

CVE-2024-0551

Disclosure Date: February 27, 2024 (last updated February 28, 2024)
Enable exports of the database and associated exported information of the system via the default user role. The attacked would have to have been granted access to the system prior to the attack. It is worth noting that the deterministic nature of the export name is lower risk as the UI for exporting would start the download at the same time, which once downloaded - deletes the export from the system. The endpoint for exporting should simply be patched to a higher privilege level.
0