Show filters
563 Total Results
Displaying 21-30 of 563
Sort by:
Attacker Value
Unknown

CVE-2025-22753

Disclosure Date: January 15, 2025 (last updated January 16, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dueclic turboSMTP allows Reflected XSS.This issue affects turboSMTP: from n/a through 4.6.
0
Attacker Value
Unknown

CVE-2024-51715

Disclosure Date: January 07, 2025 (last updated January 07, 2025)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ClickWhale ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages allows Blind SQL Injection.This issue affects ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages: from n/a through 2.4.1.
0
Attacker Value
Unknown

CVE-2024-12559

Disclosure Date: January 07, 2025 (last updated January 07, 2025)
The ClickDesigns plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'clickdesigns_add_api' and the 'clickdesigns_remove_api' functions in all versions up to, and including, 1.8.0. This makes it possible for unauthenticated attackers to modify or remove the plugin's API key.
Attacker Value
Unknown

CVE-2024-56249

Disclosure Date: January 02, 2025 (last updated January 03, 2025)
Unrestricted Upload of File with Dangerous Type vulnerability in Webdeclic WPMasterToolKit allows Upload a Web Shell to a Web Server.This issue affects WPMasterToolKit: from n/a through 1.13.1.
0
Attacker Value
Unknown

CVE-2024-56248

Disclosure Date: January 02, 2025 (last updated January 03, 2025)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Webdeclic WPMasterToolKit allows Path Traversal.This issue affects WPMasterToolKit: from n/a through 1.13.1.
0
Attacker Value
Unknown

CVE-2023-41857

Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Missing Authorization vulnerability in ClickToTweet.com Click To Tweet allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Click To Tweet: from n/a through 2.0.14.
0
Attacker Value
Unknown

CVE-2024-12323

Disclosure Date: December 10, 2024 (last updated December 21, 2024)
The turboSMTP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 4.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link while logged in to turboSMTP.
Attacker Value
Unknown

CVE-2024-11353

Disclosure Date: December 07, 2024 (last updated December 21, 2024)
The SMS for Lead Capture Forms plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_message() function in all versions up to, and including, 1.1.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary messages.
Attacker Value
Unknown

CVE-2024-54132

Disclosure Date: December 04, 2024 (last updated December 21, 2024)
The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.
0
Attacker Value
Unknown

CVE-2024-53990

Disclosure Date: December 02, 2024 (last updated December 21, 2024)
The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.
0