Show filters
8,322 Total Results
Displaying 421-430 of 8,322
Sort by:
Attacker Value
Unknown
CVE-2024-9073
Disclosure Date: September 25, 2024 (last updated February 26, 2025)
The GutenGeek Free Gutenberg Blocks for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
0
Attacker Value
Unknown
CVE-2024-45599
Disclosure Date: September 25, 2024 (last updated February 26, 2025)
Cursor is an artificial intelligence code editor. Prior to version 0.41.0, if a user on macOS has granted Cursor access to the camera or microphone, any program that is run on the machine is able to access the camera or the microphone without explicitly being granted access, through a DyLib Injection using DYLD_INSERT_LIBRARIES environment variable. The usage of `com.apple.security.cs.allow-dyld-environment-variables` and `com.apple.security.cs.disable-library-validation` allows an external dynamic library to be injected into the application using DYLD_INSERT_LIBRARIES environment variable.
Moreover, the entitlement `com.apple.security.device.camera` allows the application to use the host camera and `com.apple.security.device.audio-input` allows the application to use the microphone. This means that untrusted code that is executed on the user's machine can access the camera or the microphone, if the user has already given permission for Cursor to do so. In version 0.41.0, the entitle…
0
Attacker Value
Unknown
CVE-2024-0005
Disclosure Date: September 23, 2024 (last updated February 26, 2025)
A condition exists in FlashArray and FlashBlade Purity whereby a malicious user could execute arbitrary commands remotely through a specifically crafted SNMP configuration.
0
Attacker Value
Unknown
CVE-2024-0004
Disclosure Date: September 23, 2024 (last updated February 26, 2025)
A condition exists in FlashArray Purity whereby an user with array admin role can execute arbitrary commands remotely to escalate privilege on the array.
0
Attacker Value
Unknown
CVE-2024-0003
Disclosure Date: September 23, 2024 (last updated February 26, 2025)
A condition exists in FlashArray Purity whereby a malicious user could use a remote administrative service to create an account on the array allowing privileged access.
0
Attacker Value
Unknown
CVE-2024-0002
Disclosure Date: September 23, 2024 (last updated February 26, 2025)
A condition exists in FlashArray Purity whereby an attacker can employ a privileged account allowing remote access to the array.
0
Attacker Value
Unknown
CVE-2024-0001
Disclosure Date: September 23, 2024 (last updated February 26, 2025)
A condition exists in FlashArray Purity whereby a local account intended for initial array configuration remains active potentially allowing a malicious actor to gain elevated privileges.
0
Attacker Value
Unknown
CVE-2024-9087
Disclosure Date: September 22, 2024 (last updated February 26, 2025)
A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. This affects an unknown part of the file /edit1.php. The manipulation of the argument sno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2024-46984
Disclosure Date: September 19, 2024 (last updated February 26, 2025)
The reference validator is a tool to perform advanced validation of FHIR resources for TI applications and interoperability standards. The profile location routine in the referencevalidator commons package is vulnerable to `XML External Entities` attack due to insecure defaults of the used Woodstox WstxInputFactory. A malicious XML resource can lead to network requests issued by referencevalidator and thus to a `Server Side Request Forgery` attack. The vulnerability impacts applications which use referencevalidator to process XML resources from untrusted sources. The problem has been patched with the 2.5.1 version of the referencevalidator. Users are strongly recommended to update to this version or a more recent one. A pre-processing or manual analysis of input XML resources on existence of DTD definitions or external entities can mitigate the problem.
0
Attacker Value
Unknown
CVE-2024-31570
Disclosure Date: September 19, 2024 (last updated February 26, 2025)
libfreeimage in FreeImage 3.4.0 through 3.18.0 has a stack-based buffer overflow in the PluginXPM.cpp Load function via an XPM file.
0