Show filters
237 Total Results
Displaying 51-60 of 237
Sort by:
Attacker Value
Unknown

CVE-2023-24579

Disclosure Date: March 13, 2023 (last updated October 08, 2023)
McAfee Total Protection prior to 16.0.51 allows attackers to trick a victim into uninstalling the application via the command prompt.
Attacker Value
Unknown

CVE-2023-24578

Disclosure Date: March 13, 2023 (last updated October 08, 2023)
McAfee Total Protection prior to 16.0.49 allows attackers to elevate user privileges due to DLL sideloading. This could enable a user with lower privileges to execute unauthorized tasks.
Attacker Value
Unknown

CVE-2023-24577

Disclosure Date: March 13, 2023 (last updated October 08, 2023)
McAfee Total Protection prior to 16.0.50 allows attackers to elevate user privileges due to Improper Link Resolution via registry keys. This could enable a user with lower privileges to execute unauthorized tasks.
Attacker Value
Unknown

CVE-2022-4932

Disclosure Date: March 07, 2023 (last updated October 08, 2023)
The Total Upkeep plugin for WordPress is vulnerable to information disclosure in versions up to, and including 1.14.13. This is due to missing authorization on the heartbeat_received() function that triggers on WordPress heartbeat. This makes it possible for authenticated attackers, with subscriber-level permissions and above to retrieve back-up paths that can subsequently be used to download the back-up.
Attacker Value
Unknown

CVE-2022-43751

Disclosure Date: November 23, 2022 (last updated October 08, 2023)
McAfee Total Protection prior to version 16.0.49 contains an uncontrolled search path element vulnerability due to the use of a variable pointing to a subdirectory that may be controllable by an unprivileged user. This may have allowed the unprivileged user to execute arbitrary code with system privileges.
Attacker Value
Unknown

CVE-2022-3096

Disclosure Date: October 31, 2022 (last updated December 22, 2024)
The WP Total Hacks WordPress plugin through 4.7.2 does not prevent low privilege users from modifying the plugin's settings. This could allow users such as subscribers to perform Stored Cross-Site Scripting attacks against other users, like administrators, due to the lack of sanitisation and escaping as well.
Attacker Value
Unknown

CVE-2022-44019

Disclosure Date: October 30, 2022 (last updated December 22, 2024)
In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter.
Attacker Value
Unknown

CVE-2022-43430

Disclosure Date: October 19, 2022 (last updated October 25, 2023)
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Attacker Value
Unknown

CVE-2022-43429

Disclosure Date: October 19, 2022 (last updated November 03, 2023)
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to read arbitrary files on the Jenkins controller file system.
Attacker Value
Unknown

CVE-2022-43428

Disclosure Date: October 19, 2022 (last updated October 25, 2023)
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.