Show filters
64 Total Results
Displaying 21-30 of 64
Sort by:
Attacker Value
Unknown

CVE-2021-40970

Disclosure Date: October 01, 2021 (last updated February 23, 2025)
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the username parameter.
Attacker Value
Unknown

CVE-2020-12668

Disclosure Date: February 19, 2021 (last updated February 22, 2025)
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
Attacker Value
Unknown

CVE-2021-3286

Disclosure Date: January 26, 2021 (last updated February 22, 2025)
SQL injection exists in Spotweb 1.4.9 because the notAllowedCommands protection mechanism is inadequate, e.g., a variation of the payload may be used. NOTE: this issue exists because of an incomplete fix for CVE-2020-35545.
Attacker Value
Unknown

CVE-2020-35545

Disclosure Date: December 17, 2020 (last updated February 22, 2025)
Time-based SQL injection exists in Spotweb 1.4.9 via the query string.
Attacker Value
Unknown

CVE-2017-18608

Disclosure Date: September 10, 2019 (last updated November 27, 2024)
The spotim-comments plugin before 4.0.4 for WordPress has multiple XSS issues.
Attacker Value
Unknown

CVE-2019-15870

Disclosure Date: September 03, 2019 (last updated November 27, 2024)
The CarSpot theme before 2.1.7 for WordPress has stored XSS via the Phone Number field.
0
Attacker Value
Unknown

CVE-2019-12782

Disclosure Date: July 09, 2019 (last updated November 27, 2024)
An authorization bypass vulnerability in pinboard updates in ThoughtSpot 4.4.1 through 5.1.1 (before 5.1.2) allows a low-privilege user with write access to at least one pinboard to corrupt pinboards of another user in the application by spoofing GUIDs in pinboard update requests, effectively deleting them.
0
Attacker Value
Unknown

CVE-2018-18893

Disclosure Date: January 03, 2019 (last updated November 27, 2024)
Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java.
0
Attacker Value
Unknown

CVE-2018-1000843

Disclosure Date: December 20, 2018 (last updated November 08, 2023)
Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later.
0
Attacker Value
Unknown

CVE-2017-16035

Disclosure Date: June 04, 2018 (last updated November 26, 2024)
The hubl-server module is a wrapper for the HubL Development Server. During installation hubl-server downloads a set of dependencies from api.hubapi.com. It appears in the code that these files are downloaded over HTTPS however the api.hubapi.com endpoint redirects to a HTTP url. Because of this behavior an attacker with the ability to man-in-the-middle a developer or system performing a package installation could compromise the integrity of the installation.
0