Show filters
277 Total Results
Displaying 231-240 of 277
Sort by:
Attacker Value
Unknown

CVE-2023-28823

Disclosure Date: August 11, 2023 (last updated February 25, 2025)
Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2023-27391

Disclosure Date: August 11, 2023 (last updated February 25, 2025)
Improper access control in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow a privileged user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2023-35047

Disclosure Date: July 11, 2023 (last updated February 25, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in AREOI All Bootstrap Blocks plugin <= 1.3.6 versions.
Attacker Value
Unknown

CVE-2023-2087

Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The Essential Blocks plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.6. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Attacker Value
Unknown

CVE-2023-2086

Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the template_count function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
Attacker Value
Unknown

CVE-2023-2085

Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the templates function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
Attacker Value
Unknown

CVE-2023-2084

Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the get function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
Attacker Value
Unknown

CVE-2023-2083

Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the save function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to save plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
Attacker Value
Unknown

CVE-2023-0584

Disclosure Date: June 03, 2023 (last updated February 25, 2025)
The VK Blocks plugin for WordPress is vulnerable to improper authorization via the REST 'update_options' function in versions up to, and including, 1.57.0.5. This allows authenticated attackers, with contributor-level permissions or above, to change the 'vk_font_awesome_version' option to an arbitrary value.
Attacker Value
Unknown

CVE-2023-0583

Disclosure Date: June 03, 2023 (last updated February 25, 2025)
The VK Blocks plugin for WordPress is vulnerable to improper authorization via the REST 'update_vk_blocks_options' function in versions up to, and including, 1.57.0.5. This allows authenticated attackers, with contributor-level permissions or above, to change plugin settings including default icons.