Show filters
349 Total Results
Displaying 41-50 of 349
Sort by:
Attacker Value
Unknown

CVE-2024-38859

Disclosure Date: August 26, 2024 (last updated December 21, 2024)
XSS in the view page with the SLA column configured in Checkmk versions prior to 2.3.0p14, 2.2.0p33, 2.1.0p47 and 2.0.0 (EOL) allowed malicious users to execute arbitrary scripts by injecting HTML elements into the SLA column title. These scripts could be executed when the view page was cloned by other users.
Attacker Value
Unknown

CVE-2024-28829

Disclosure Date: August 20, 2024 (last updated December 21, 2024)
Least privilege violation and reliance on untrusted inputs in the mk_informix Checkmk agent plugin before Checkmk 2.3.0p12, 2.2.0p32, 2.1.0p47 and 2.0.0 (EOL) allows local users to escalate privileges.
Attacker Value
Unknown

CVE-2024-43315

Disclosure Date: August 18, 2024 (last updated August 19, 2024)
Authorization Bypass Through User-Controlled Key vulnerability in Checkout Plugins Stripe Payments For WooCommerce by Checkout.This issue affects Stripe Payments For WooCommerce by Checkout: from n/a through 1.9.1.
0
Attacker Value
Unknown

CVE-2024-42482

Disclosure Date: August 12, 2024 (last updated September 18, 2024)
fish-shop/syntax-check is a GitHub action for syntax checking fish shell files. Improper neutralization of delimiters in the `pattern` input (specifically the command separator `;` and command substitution characters `(` and `)`) mean that arbitrary command injection is possible by modification of the input value used in a workflow. This has the potential for exposure or exfiltration of sensitive information from the workflow runner, such as might be achieved by sending environment variables to an external entity. It is recommended that users update to the patched version `v1.6.12` or the latest release version `v2.0.0`, however remediation may be possible through careful control of workflows and the `pattern` input value used by this action.
Attacker Value
Unknown

CVE-2024-6542

Disclosure Date: July 22, 2024 (last updated August 15, 2024)
Improper neutralization of livestatus command delimiters in mknotifyd in Checkmk <= 2.0.0p39, < 2.1.0p47, < 2.2.0p32 and < 2.3.0p11 allows arbitrary livestatus command execution.
Attacker Value
Unknown

CVE-2024-28828

Disclosure Date: July 10, 2024 (last updated August 08, 2024)
Cross-Site request forgery in Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45, and <= 2.0.0p39 (EOL) could lead to 1-click compromize of the site.
Attacker Value
Unknown

CVE-2024-28827

Disclosure Date: July 10, 2024 (last updated December 21, 2024)
Incorrect permissions on the Checkmk Windows Agent's data directory in Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45, and <= 2.0.0p39 (EOL) allows a local attacker to gain SYSTEM privileges.
Attacker Value
Unknown

CVE-2024-6556

Disclosure Date: July 10, 2024 (last updated January 05, 2025)
The SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.10.8. This is due the plugin utilizing mobiledetect without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
0
Attacker Value
Unknown

CVE-2024-6163

Disclosure Date: July 08, 2024 (last updated August 21, 2024)
Certain http endpoints of Checkmk in Checkmk < 2.3.0p10 < 2.2.0p31, < 2.1.0p46, <= 2.0.0p39 allows remote attacker to bypass authentication and access data
Attacker Value
Unknown

CVE-2024-6052

Disclosure Date: July 03, 2024 (last updated September 16, 2024)
Stored XSS in Checkmk before versions 2.3.0p8, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements