Show filters
9,978 Total Results
Displaying 541-550 of 9,978
Sort by:
Attacker Value
Unknown
CVE-2024-11195
Disclosure Date: November 19, 2024 (last updated February 27, 2025)
The Email Subscription Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's print_email_subscribe_form shortcode in all versions up to, and including, 1.2.22 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2024-52432
Disclosure Date: November 18, 2024 (last updated February 27, 2025)
Deserialization of Untrusted Data vulnerability in NIX Solutions Ltd NIX Anti-Spam Light allows Object Injection.This issue affects NIX Anti-Spam Light: from n/a through 0.0.4.
0
Attacker Value
Unknown
CVE-2024-11304
Disclosure Date: November 18, 2024 (last updated February 27, 2025)
Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS). This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
0
Attacker Value
Unknown
CVE-2024-11303
Disclosure Date: November 18, 2024 (last updated February 27, 2025)
The pathname of the root directory to a Restricted Directory ('Path Traversal') vulnerability in Korenix JetPort 5601 allows Path Traversal.This issue affects JetPort 5601: through 1.2.
0
Attacker Value
Unknown
CVE-2024-52410
Disclosure Date: November 16, 2024 (last updated February 27, 2025)
Deserialization of Untrusted Data vulnerability in Phoenixheart Referrer Detector allows Object Injection.This issue affects Referrer Detector: from n/a through 4.2.1.0.
0
Attacker Value
Unknown
CVE-2024-9935
Disclosure Date: November 16, 2024 (last updated February 27, 2025)
The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5 via the rtw_pgaepb_dwnld_pdf() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
0
Attacker Value
Unknown
CVE-2024-10533
Disclosure Date: November 16, 2024 (last updated February 27, 2025)
The WP Chat App plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the ajax_install_plugin() function in all versions up to, and including, 3.6.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the filebird plugin.
0
Attacker Value
Unknown
CVE-2024-11246
Disclosure Date: November 15, 2024 (last updated February 27, 2025)
A vulnerability, which was classified as problematic, was found in code-projects Farmacia 1.0. Affected is an unknown function of the file /adicionar-cliente.php. The manipulation of the argument nome/cpf/dataNascimento leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter "nome" to be affected. But further inspection indicates that other parameters might be affected as well.
0
Attacker Value
Unknown
CVE-2024-11245
Disclosure Date: November 15, 2024 (last updated February 27, 2025)
A vulnerability, which was classified as critical, has been found in code-projects Farmacia 1.0. This issue affects some unknown processing of the file /editar-produto.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2024-11244
Disclosure Date: November 15, 2024 (last updated February 27, 2025)
A vulnerability classified as critical was found in code-projects Farmacia 1.0. This vulnerability affects unknown code of the file /editar-cliente.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
0