Show filters
6,928 Total Results
Displaying 211-220 of 6,928
Sort by:
Attacker Value
Unknown
CVE-2023-51362
Disclosure Date: December 09, 2024 (last updated December 21, 2024)
Missing Authorization vulnerability in Premio All-in-one Floating Contact Form – My Sticky Elements allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects All-in-one Floating Contact Form – My Sticky Elements: from n/a through 2.1.3.
0
Attacker Value
Unknown
CVE-2023-25486
Disclosure Date: December 09, 2024 (last updated December 21, 2024)
Missing Authorization vulnerability in Migrate Clone allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Clone: from n/a through 2.3.7.
0
Attacker Value
Unknown
CVE-2024-12355
Disclosure Date: December 09, 2024 (last updated December 21, 2024)
A vulnerability has been found in SourceCodester Phone Contact Manager System 1.0 and classified as problematic. Affected by this vulnerability is the function ContactBook::adding of the file ContactBook.cpp. The manipulation leads to improper input validation. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2024-12354
Disclosure Date: December 09, 2024 (last updated December 21, 2024)
A vulnerability, which was classified as critical, was found in SourceCodester Phone Contact Manager System 1.0. Affected is the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation leads to buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2024-12353
Disclosure Date: December 09, 2024 (last updated December 21, 2024)
A vulnerability, which was classified as problematic, has been found in SourceCodester Phone Contact Manager System 1.0. This issue affects the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation of the argument name leads to improper input validation. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2024-40745
Disclosure Date: December 04, 2024 (last updated December 21, 2024)
Reflected Cross site scripting vulnerability in Convert Forms component for Joomla in versions before 4.4.8.
0
Attacker Value
Unknown
CVE-2024-40744
Disclosure Date: December 04, 2024 (last updated December 21, 2024)
Unrestricted file upload via security bypass in Convert Forms component for Joomla in versions before 4.4.8.
0
Attacker Value
Unknown
CVE-2024-11769
Disclosure Date: December 04, 2024 (last updated December 21, 2024)
The Flower Delivery by Florist One plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'flower-delivery' shortcode in all versions up to, and including, 3.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2024-45106
Disclosure Date: December 03, 2024 (last updated December 21, 2024)
Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if:
* ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false.
* The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators.
Users are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint.
0
Attacker Value
Unknown
CVE-2024-10895
Disclosure Date: November 27, 2024 (last updated December 21, 2024)
The Counter Up – Animated Number Counter & Milestone Showcase plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'lgx-counter' shortcode in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0