Show filters
2,830 Total Results
Displaying 231-240 of 2,830
Sort by:
Attacker Value
Unknown

CVE-2024-8965

Disclosure Date: September 27, 2024 (last updated October 05, 2024)
The Absolute Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Name' field of a custom post criteria in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2024-6787

Disclosure Date: September 21, 2024 (last updated October 01, 2024)
This vulnerability occurs when an attacker exploits a race condition between the time a file is checked and the time it is used (TOCTOU). By exploiting this race condition, an attacker can write arbitrary files to the system. This could allow the attacker to execute malicious code and potentially cause file losses.
Attacker Value
Unknown

CVE-2024-6786

Disclosure Date: September 21, 2024 (last updated October 01, 2024)
The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.
Attacker Value
Unknown

CVE-2024-6785

Disclosure Date: September 21, 2024 (last updated September 28, 2024)
The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure.
Attacker Value
Unknown

CVE-2024-8052

Disclosure Date: September 17, 2024 (last updated September 28, 2024)
The Review Ratings WordPress plugin through 1.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
Attacker Value
Unknown

CVE-2024-45823

Disclosure Date: September 12, 2024 (last updated October 03, 2024)
CVE-2024-45823 IMPACT An authentication bypass vulnerability exists in the affected product. The vulnerability exists due to shared secrets across accounts and could allow a threat actor to impersonate a user if the threat actor is able to enumerate additional information required during authentication.
Attacker Value
Unknown

CVE-2024-45824

Disclosure Date: September 12, 2024 (last updated February 01, 2025)
CVE-2024-45824 IMPACT A remote code vulnerability exists in the affected products. The vulnerability occurs when chained with Path Traversal, Command Injection, and XSS Vulnerabilities and allows for full unauthenticated remote code execution. The link in the mitigations section below contains patches to fix this issue.
Attacker Value
Unknown

CVE-2024-8277

Disclosure Date: September 11, 2024 (last updated September 27, 2024)
The WooCommerce Photo Reviews Premium plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.3.13.2. This is due to the plugin not properly validating what user transient is being used in the login() function and not properly verifying the user's identity. This makes it possible for unauthenticated attackers to log in as user that has dismissed an admin notice in the past 30 days, which is often an administrator. Alternatively, a user can log in as any user with any transient that has a valid user_id as the value, though it would be more difficult to exploit this successfully.
Attacker Value
Unknown

CVE-2024-6596

Disclosure Date: September 10, 2024 (last updated October 02, 2024)
An unauthenticated remote attacker can run malicious c# code included in curve files and execute commands in the users context.
Attacker Value
Unknown

CVE-2024-45504

Disclosure Date: September 10, 2024 (last updated September 10, 2024)
Cross-site request forgery (CSRF) vulnerability in multiple Alps System Integration products and the OEM products allow a remote unauthenticated attacker to hijack the authentication of the user and to perform unintended operations if the user views a malicious page while logged in.
0