Show filters
110 Total Results
Displaying 21-30 of 110
Sort by:
Attacker Value
Unknown

CVE-2023-0336

Disclosure Date: March 27, 2023 (last updated October 08, 2023)
The OoohBoi Steroids for Elementor WordPress plugin before 2.1.5 has CSRF and broken access control vulnerabilities which leads user with role as low as subscriber to delete attachment.
Attacker Value
Unknown

CVE-2022-40806

Disclosure Date: September 19, 2022 (last updated October 08, 2023)
The d8s-uuids for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0
Attacker Value
Unknown

CVE-2015-10002

Disclosure Date: March 28, 2022 (last updated October 07, 2023)
A vulnerability classified as problematic has been found in Kiddoware Kids Place. This affects the Home Button Protection. A repeated pressing of the button causes a local denial of service. It is recommended to upgrade the affected component.
Attacker Value
Unknown

CVE-2021-21417

Disclosure Date: April 29, 2021 (last updated February 22, 2025)
fluidsynth is a software synthesizer based on the SoundFont 2 specifications. A use after free violation was discovered in fluidsynth, that can be triggered when loading an invalid SoundFont file.
Attacker Value
Unknown

CVE-2020-13168

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
SysAid 20.1.11b26 allows reflected XSS via the ForgotPassword.jsp accountid parameter.
Attacker Value
Unknown

CVE-2020-14292

Disclosure Date: September 09, 2020 (last updated November 28, 2024)
In the COVIDSafe application through 1.0.21 for Android, unsafe use of the Bluetooth transport option in the GATT connection allows attackers to trick the application into establishing a connection over Bluetooth BR/EDR transport, which reveals the public Bluetooth address of the victim's phone without authorisation, bypassing the Bluetooth address randomisation protection in the user's phone.
Attacker Value
Unknown

CVE-2020-11613

Disclosure Date: June 11, 2020 (last updated February 21, 2025)
Mids' Reborn Hero Designer 2.6.0.7 has an elevation of privilege vulnerability due to default and insecure permissions being set for the installation folder. By default, the Authenticated Users group has Modify permissions to the installation folder. Because of this, any user on the system can replace binaries or plant malicious DLLs to obtain elevated, or different, privileges, depending on the context of the user that runs the application.
Attacker Value
Unknown

CVE-2020-11614

Disclosure Date: June 11, 2020 (last updated February 21, 2025)
Mids' Reborn Hero Designer 2.6.0.7 downloads the update manifest, as well as update files, over cleartext HTTP. Additionally, the application does not perform file integrity validation for files after download. An attacker can perform a man-in-the-middle attack against this connection and replace executable files with malicious versions, which the operating system then executes under the context of the user running Hero Designer.
Attacker Value
Unknown

CVE-2020-12860

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
COVIDSafe through v1.0.17 allows a remote attacker to access phone name and model information because a BLE device can have four roles and COVIDSafe uses all of them. This allows for re-identification of a device, and potentially identification of the owner's name.
Attacker Value
Unknown

CVE-2020-12859

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
Unnecessary fields in the OpenTrace/BlueTrace protocol in COVIDSafe through v1.0.17 allow a remote attacker to identify a device model by observing cleartext payload data. This allows re-identification of devices, especially less common phone models or those in low-density situations.