Show filters
6,774 Total Results
Displaying 321-330 of 6,774
Sort by:
Attacker Value
Unknown

CVE-2024-10175

Disclosure Date: November 27, 2024 (last updated February 27, 2025)
The Pricing Tables For WPBakery Page Builder (formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wdo_pricing_tables shortcode in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2024-11219

Disclosure Date: November 27, 2024 (last updated February 27, 2025)
The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.0.6 via the get_image function. This makes it possible for unauthenticated attackers to view arbitrary images on the server, which can contain sensitive information.
0
Attacker Value
Unknown

CVE-2024-9929

Disclosure Date: November 26, 2024 (last updated February 27, 2025)
A vulnerability exists in NSD570 that allows any authenticated user to access all device logs disclosing login information with timestamps.
0
Attacker Value
Unknown

CVE-2024-9928

Disclosure Date: November 26, 2024 (last updated February 27, 2025)
A vulnerability exists in NSD570 login panel that does not restrict excessive authentication attempts. If exploited, this could cause account takeover and unauthorized access to the system when an attacker conducts brute-force attacks against the equipment login. Note that the system supports only one concurrent session and implements a delay of more than a second between failed login attempts making it difficult to automate the attacks.
0
Attacker Value
Unknown

CVE-2024-8236

Disclosure Date: November 26, 2024 (last updated February 27, 2025)
The Elementor Website Builder – More than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter of the Icon widget in all versions up to, and including, 3.25.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2024-53278

Disclosure Date: November 26, 2024 (last updated February 27, 2025)
Cross-site scripting vulnerability exists in WP Admin UI Customize versions prior to ver 1.5.14. If a malicious admin user customizes the admin screen with some malicious contents, an arbitrary script may be executed on the web browser of the other users who are accessing the admin screen.
0
Attacker Value
Unknown

CVE-2024-49597

Disclosure Date: November 26, 2024 (last updated February 27, 2025)
Dell Wyse Management Suite, versions WMS 4.4 and prior, contain an Improper Restriction of Excessive Authentication Attempts vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass.
Attacker Value
Unknown

CVE-2024-49596

Disclosure Date: November 26, 2024 (last updated February 27, 2025)
Dell Wyse Management Suite, version WMS 4.4 and prior, contain a Missing Authorization vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service and arbitrary file deletion
Attacker Value
Unknown

CVE-2024-49595

Disclosure Date: November 26, 2024 (last updated February 27, 2025)
Dell Wyse Management Suite, version WMS 4.4 and before, contain an Authentication Bypass by Capture-replay vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service.
Attacker Value
Unknown

CVE-2024-9666

Disclosure Date: November 25, 2024 (last updated February 27, 2025)
A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.
0