Show filters
121 Total Results
Displaying 41-50 of 121
Sort by:
Attacker Value
Unknown
CVE-2023-35866
Disclosure Date: June 19, 2023 (last updated November 08, 2023)
In KeePassXC through 2.7.5, a local attacker can make changes to the Database security settings, including master password and second-factor authentication, within an authenticated KeePassXC Database session, without the need to authenticate these changes by entering the password and/or second-factor authentication to confirm changes. NOTE: the vendor's position is "asking the user for their password prior to making any changes to the database settings adds no additional protection against a local attacker."
0
Attacker Value
Unknown
CVE-2023-34246
Disclosure Date: June 12, 2023 (last updated October 08, 2023)
Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape. Prior to version 5.6.6, Doorkeeper automatically processes authorization requests without user consent for public clients that have been previous approved. Public clients are inherently vulnerable to impersonation, their identity cannot be assured. This issue is fixed in version 5.6.6.
0
Attacker Value
Unknown
CVE-2023-26128
Disclosure Date: May 27, 2023 (last updated October 08, 2023)
All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function.
**Note:**
To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
0
Attacker Value
Unknown
CVE-2023-28394
Disclosure Date: May 23, 2023 (last updated October 08, 2023)
Beekeeper Studio versions prior to 3.9.9 allows a remote authenticated attacker to execute arbitrary JavaScript code with the privilege of the application on the PC where the affected product is installed. As a result, an arbitrary OS command may be executed as well.
0
Attacker Value
Unknown
CVE-2023-23720
Disclosure Date: May 16, 2023 (last updated October 08, 2023)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NetReviews SAS Verified Reviews (Avis Vérifiés) plugin <= 2.3.13 versions.
0
Attacker Value
Unknown
CVE-2023-25793
Disclosure Date: April 25, 2023 (last updated October 08, 2023)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in George Pattihis Link Juice Keeper plugin <= 2.0.2 versions.
0
Attacker Value
Unknown
CVE-2023-1426
Disclosure Date: April 10, 2023 (last updated October 08, 2023)
The WP Tiles WordPress plugin through 1.1.2 does not ensure that posts to be displayed are not draft/private, allowing any authenticated users, such as subscriber to retrieve the titles of draft and privates posts for example. AN attacker could also retrieve the title of any other type of post.
0
Attacker Value
Unknown
CVE-2022-4827
Disclosure Date: April 10, 2023 (last updated October 08, 2023)
The WP Tiles WordPress plugin through 1.1.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
0
Attacker Value
Unknown
CVE-2023-24055
Disclosure Date: January 22, 2023 (last updated November 08, 2023)
KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
0
Attacker Value
Unknown
CVE-2018-25074
Disclosure Date: January 11, 2023 (last updated October 20, 2023)
A vulnerability was found in Prestaul skeemas and classified as problematic. This issue affects some unknown processing of the file validators/base.js. The manipulation of the argument uri leads to inefficient regular expression complexity. The patch is named 65e94eda62dc8dc148ab3e59aa2ccc086ac448fd. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218003.
0