Show filters
774 Total Results
Displaying 41-50 of 774
Sort by:
Attacker Value
Unknown
CVE-2024-54000
Disclosure Date: December 03, 2024 (last updated December 21, 2024)
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. In versions prior to 3.9.7, the requests.get() request in the _check_url method is specified as allow_redirects=True, which allows a server-side request forgery when a request to .well-known/assetlinks.json" returns a 302 redirect. This is a bypass of the fix for CVE-2024-29190 and is fixed in 3.9.7.
0
Attacker Value
Unknown
CVE-2024-53999
Disclosure Date: December 03, 2024 (last updated December 21, 2024)
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The application allows users to upload files with scripts in the filename parameter. As a result, a malicious user can upload a script file to the system. When users in the application use the "Diff or Compare" functionality, they are affected by a Stored Cross-Site Scripting vulnerability. This vulnerability is fixed in 4.2.9.
0
Attacker Value
Unknown
CVE-2024-52465
Disclosure Date: December 02, 2024 (last updated December 21, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Data443 LGPD Framework allows Reflected XSS.This issue affects LGPD Framework: from n/a through 2.0.2.
0
Attacker Value
Unknown
CVE-2024-11024
Disclosure Date: November 26, 2024 (last updated January 05, 2025)
The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.6. This is due to the plugin not properly validating a user's password reset code prior to updating their password. This makes it possible for unauthenticated attackers, with knowledge of a user's email address, to reset the user's password and gain access to their account.
0
Attacker Value
Unknown
CVE-2020-12492
Disclosure Date: November 25, 2024 (last updated January 05, 2025)
Improper handling of WiFi information by framework services can allow certain malicious applications to obtain sensitive information.
0
Attacker Value
Unknown
CVE-2020-12491
Disclosure Date: November 25, 2024 (last updated January 05, 2025)
Improper control of framework service permissions with possibility of some sensitive device information leakage.
0
Attacker Value
Unknown
CVE-2024-9443
Disclosure Date: November 05, 2024 (last updated November 08, 2024)
The Basticom Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
0
Attacker Value
Unknown
CVE-2024-43235
Disclosure Date: November 01, 2024 (last updated November 02, 2024)
Missing Authorization vulnerability in MetaBox.Io Meta Box – WordPress Custom Fields Framework allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Meta Box – WordPress Custom Fields Framework: from n/a through 5.9.10.
0
Attacker Value
Unknown
CVE-2024-38820
Disclosure Date: October 18, 2024 (last updated October 23, 2024)
The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.
0
Attacker Value
Unknown
CVE-2024-9305
Disclosure Date: October 16, 2024 (last updated January 06, 2025)
The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.4. This is due to the appp_reset_password() and validate_reset_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.
0