Show filters
67 Total Results
Displaying 41-50 of 67
Sort by:
Attacker Value
Unknown

CVE-2020-13652

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200528, 2019R2 before p20200430, and 2020R1 before p20200507. A cross-site scripting (XSS) vulnerability exists in the login menu.
Attacker Value
Unknown

CVE-2020-13650

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
An issue was discovered in DigDash 2018R2 before p20200210 and 2019R1 before p20200210. The login page is vulnerable to Server-Side Request Forgery (SSRF) that allows use of the application as a proxy. Sent to an external server, a forged request discloses application credentials. For a request to an internal component, the request is blind, but through the error message it's possible to determine whether the request targeted a open service.
Attacker Value
Unknown

CVE-2020-12725

Disclosure Date: June 11, 2020 (last updated February 21, 2025)
Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting any HTTP verb, etc.
Attacker Value
Unknown

CVE-2020-6009

Disclosure Date: April 01, 2020 (last updated February 21, 2025)
LearnDash Wordpress plugin version below 3.1.6 is vulnerable to Unauthenticated SQL Injection.
Attacker Value
Unknown

CVE-2020-7108

Disclosure Date: January 16, 2020 (last updated February 21, 2025)
The LearnDash LMS plugin before 3.1.2 for WordPress allows XSS via the ld-profile search field.
Attacker Value
Unknown

CVE-2019-16752

Disclosure Date: December 04, 2019 (last updated November 27, 2024)
An issue was discovered in Decentralized Anonymous Payment System (DAPS) through 2019-08-26. It is possible to force wallets to send HTTP requests to arbitrary locations, both on the local network and on the internet. This is a serious threat to user privacy, since it can possibly leak their IP address and the fact that they are using the product. This also affects Dash Core through 0.14.0.3 and Private Instant Verified Transactions (PIVX) through 3.4.0.
Attacker Value
Unknown

CVE-2019-17397

Disclosure Date: October 15, 2019 (last updated November 27, 2024)
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
Attacker Value
Unknown

CVE-2015-9435

Disclosure Date: September 26, 2019 (last updated November 27, 2024)
The oauth2-provider plugin before 3.1.5 for WordPress has incorrect generation of random numbers.
Attacker Value
Unknown

CVE-2015-9322

Disclosure Date: August 16, 2019 (last updated November 27, 2024)
The erident-custom-login-and-dashboard plugin before 3.5 for WordPress has CSRF.
0
Attacker Value
Unknown

CVE-2019-10744

Disclosure Date: July 26, 2019 (last updated January 21, 2024)
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.