Show filters
404 Total Results
Displaying 51-60 of 404
Sort by:
Attacker Value
Unknown
CVE-2024-6590
Disclosure Date: September 25, 2024 (last updated October 01, 2024)
The Spreadsheet Integration – Automate Google Sheets With WordPress, WooCommerce & Most Popular Form Plugins. Also, Display Google sheet as a Table. plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 3.7.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit post status, edit Google sheet integrations, and create Google sheet integrations.
0
Attacker Value
Unknown
CVE-2024-28981
Disclosure Date: September 12, 2024 (last updated September 12, 2024)
Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.1.0.0 and 9.3.0.8, including 8.3.x, discloses database passwords when searching metadata injectable fields.
0
Attacker Value
Unknown
CVE-2024-45076
Disclosure Date: September 04, 2024 (last updated September 07, 2024)
IBM webMethods Integration 10.15 could allow an authenticated user to upload and execute arbitrary files which could be executed on the underlying operating system.
0
Attacker Value
Unknown
CVE-2024-45075
Disclosure Date: September 04, 2024 (last updated September 07, 2024)
IBM webMethods Integration 10.15 could allow an authenticated user to create scheduler tasks that would allow them to escalate their privileges to administrator due to missing authentication.
0
Attacker Value
Unknown
CVE-2024-45074
Disclosure Date: September 04, 2024 (last updated September 07, 2024)
IBM webMethods Integration 10.15 could allow an authenticated user to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
0
Attacker Value
Unknown
CVE-2024-43340
Disclosure Date: August 26, 2024 (last updated August 28, 2024)
Cross-Site Request Forgery (CSRF) vulnerability in Nasirahmed Advanced Form Integration.This issue affects Advanced Form Integration: from n/a through 1.89.4.
0
Attacker Value
Unknown
CVE-2024-7885
Disclosure Date: August 21, 2024 (last updated December 12, 2024)
A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.
0
Attacker Value
Unknown
CVE-2024-6568
Disclosure Date: August 21, 2024 (last updated August 21, 2024)
The Flamix: Bitrix24 and Contact Form 7 integrations plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.1.0. This is due the plugin utilizing mobiledetect without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
0
Attacker Value
Unknown
CVE-2024-37946
Disclosure Date: July 20, 2024 (last updated July 20, 2024)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs ReCaptcha Integration for WordPress allows Stored XSS.This issue affects ReCaptcha Integration for WordPress: from n/a through 1.2.5.
0
Attacker Value
Unknown
CVE-2023-40702
Disclosure Date: July 09, 2024 (last updated July 10, 2024)
PingOne MFA Integration Kit contains a vulnerability where the skipMFA action can be configured such that user authentication does not require the second factor authentication from the user's existing registered devices. A threat actor might be able to exploit this vulnerability to authenticate as a target user if they have existing knowledge of the target user’s first-factor credentials.
0