Show filters
744 Total Results
Displaying 51-60 of 744
Sort by:
Attacker Value
Unknown
CVE-2024-49608
Disclosure Date: October 20, 2024 (last updated October 25, 2024)
: Incorrect Privilege Assignment vulnerability in Gerry Ntabuhashe GERRYWORKS Post by Mail allows Privilege Escalation.This issue affects GERRYWORKS Post by Mail: from n/a through 1.0.
0
Attacker Value
Unknown
CVE-2022-4974
Disclosure Date: October 16, 2024 (last updated October 16, 2024)
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
0
Attacker Value
Unknown
CVE-2024-8760
Disclosure Date: October 12, 2024 (last updated October 12, 2024)
The Stackable – Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to CSS Injection in all versions up to, and including, 3.13.6. This makes it possible for unauthenticated attackers to embed untrusted style information into comments resulting in a possibility of data exfiltration such as admin nonces with limited impact. These nonces could be used to perform CSRF attacks within a limited time window. The presence of other plugins may make additional nonces available, which may pose a risk in plugins that don't perform capability checks to protect AJAX actions or other actions reachable by lower-privileged users.
0
Attacker Value
Unknown
CVE-2024-9341
Disclosure Date: October 01, 2024 (last updated December 21, 2024)
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
0
Attacker Value
Unknown
CVE-2024-45604
Disclosure Date: September 17, 2024 (last updated September 26, 2024)
Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2024-45398
Disclosure Date: September 17, 2024 (last updated September 26, 2024)
Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory.
0
Attacker Value
Unknown
CVE-2024-45612
Disclosure Date: September 17, 2024 (last updated September 24, 2024)
Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings.
0
Attacker Value
Unknown
CVE-2024-28981
Disclosure Date: September 12, 2024 (last updated September 12, 2024)
Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.1.0.0 and 9.3.0.8, including 8.3.x, discloses database passwords when searching metadata injectable fields.
0
Attacker Value
Unknown
CVE-2024-7699
Disclosure Date: September 10, 2024 (last updated September 28, 2024)
An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data.
0
Attacker Value
Unknown
CVE-2024-7698
Disclosure Date: September 10, 2024 (last updated September 28, 2024)
A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks.
0