Show filters
67 Total Results
Displaying 41-50 of 67
Sort by:
Attacker Value
Unknown
CVE-2020-13652
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200528, 2019R2 before p20200430, and 2020R1 before p20200507. A cross-site scripting (XSS) vulnerability exists in the login menu.
0
Attacker Value
Unknown
CVE-2020-13650
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
An issue was discovered in DigDash 2018R2 before p20200210 and 2019R1 before p20200210. The login page is vulnerable to Server-Side Request Forgery (SSRF) that allows use of the application as a proxy. Sent to an external server, a forged request discloses application credentials. For a request to an internal component, the request is blind, but through the error message it's possible to determine whether the request targeted a open service.
0
Attacker Value
Unknown
CVE-2020-12725
Disclosure Date: June 11, 2020 (last updated February 21, 2025)
Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting any HTTP verb, etc.
0
Attacker Value
Unknown
CVE-2020-6009
Disclosure Date: April 01, 2020 (last updated February 21, 2025)
LearnDash Wordpress plugin version below 3.1.6 is vulnerable to Unauthenticated SQL Injection.
0
Attacker Value
Unknown
CVE-2020-7108
Disclosure Date: January 16, 2020 (last updated February 21, 2025)
The LearnDash LMS plugin before 3.1.2 for WordPress allows XSS via the ld-profile search field.
0
Attacker Value
Unknown
CVE-2019-16752
Disclosure Date: December 04, 2019 (last updated November 27, 2024)
An issue was discovered in Decentralized Anonymous Payment System (DAPS) through 2019-08-26. It is possible to force wallets to send HTTP requests to arbitrary locations, both on the local network and on the internet. This is a serious threat to user privacy, since it can possibly leak their IP address and the fact that they are using the product. This also affects Dash Core through 0.14.0.3 and Private Instant Verified Transactions (PIVX) through 3.4.0.
0
Attacker Value
Unknown
CVE-2019-17397
Disclosure Date: October 15, 2019 (last updated November 27, 2024)
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
0
Attacker Value
Unknown
CVE-2015-9435
Disclosure Date: September 26, 2019 (last updated November 27, 2024)
The oauth2-provider plugin before 3.1.5 for WordPress has incorrect generation of random numbers.
0
Attacker Value
Unknown
CVE-2015-9322
Disclosure Date: August 16, 2019 (last updated November 27, 2024)
The erident-custom-login-and-dashboard plugin before 3.5 for WordPress has CSRF.
0
Attacker Value
Unknown
CVE-2019-10744
Disclosure Date: July 26, 2019 (last updated January 21, 2024)
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
0