Show filters
501 Total Results
Displaying 21-30 of 501
Sort by:
Attacker Value
Unknown
CVE-2024-10548
Disclosure Date: December 19, 2024 (last updated February 27, 2025)
The WP Project Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.15 via the Project Task List ('/wp-json/pm/v2/projects/1/task-lists') REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including the hashed passwords of project owners (e.g. adminstrators).
0
Attacker Value
Unknown
CVE-2024-54336
Disclosure Date: December 13, 2024 (last updated February 27, 2025)
Authentication Bypass Using an Alternate Path or Channel vulnerability in Projectopia Projectopia allows Authentication Bypass.This issue affects Projectopia: from n/a through 5.1.7.
0
Attacker Value
Unknown
CVE-2023-40003
Disclosure Date: December 13, 2024 (last updated February 27, 2025)
Missing Authorization vulnerability in weDevs WP Project Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Project Manager: from n/a through 2.6.7.
0
Attacker Value
Unknown
CVE-2023-39995
Disclosure Date: December 13, 2024 (last updated February 27, 2025)
Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Portfolio and Projects allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Portfolio and Projects: from n/a through 1.3.7.
0
Attacker Value
Unknown
CVE-2024-12231
Disclosure Date: December 05, 2024 (last updated February 28, 2025)
A vulnerability, which was classified as critical, was found in CodeZips Project Management System 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2024-53982
Disclosure Date: December 04, 2024 (last updated February 27, 2025)
ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.
0
Attacker Value
Unknown
CVE-2024-12015
Disclosure Date: December 02, 2024 (last updated February 27, 2025)
The 'Project Manager' WordPress Plugin is affected by an authenticated SQL injection vulnerability in the 'orderby' parameter in the '/pm/v2/activites' route.
0
Attacker Value
Unknown
CVE-2024-11680
Disclosure Date: November 26, 2024 (last updated February 27, 2025)
ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
0
Attacker Value
Unknown
CVE-2024-10520
Disclosure Date: November 20, 2024 (last updated February 27, 2025)
The WP Project Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check in the 'check' method of the 'Create_Milestone', 'Create_Task_List', 'Create_Task', and 'Delete_Task' classes in version 2.6.14. This makes it possible for unauthenticated attackers to create milestones, create task lists, create tasks, or delete tasks in any project. NOTE: Version 2.6.14 implemented a partial fix for this vulnerability.
0
Attacker Value
Unknown
CVE-2024-52552
Disclosure Date: November 13, 2024 (last updated February 27, 2025)
Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
0