Show filters
406 Total Results
Displaying 61-70 of 406
Sort by:
Attacker Value
Unknown
CVE-2024-34821
Disclosure Date: June 11, 2024 (last updated August 08, 2024)
Missing Authorization vulnerability in Contact List PRO Contact List – Easy Business Directory, Staff Directory and Address Book Plugin.This issue affects Contact List – Easy Business Directory, Staff Directory and Address Book Plugin: from n/a through 2.9.87.
0
Attacker Value
Unknown
CVE-2024-5518
Disclosure Date: May 30, 2024 (last updated February 12, 2025)
A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown part of the file change_profile_picture.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266589 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2024-5517
Disclosure Date: May 30, 2024 (last updated February 12, 2025)
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file changepwd.php. The manipulation of the argument useremail leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266588.
0
Attacker Value
Unknown
CVE-2024-5516
Disclosure Date: May 30, 2024 (last updated February 12, 2025)
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file massage.php. The manipulation of the argument bid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266587.
0
Attacker Value
Unknown
CVE-2024-4611
Disclosure Date: May 29, 2024 (last updated January 05, 2025)
The AppPresser plugin for WordPress is vulnerable to improper missing encryption exception handling on the 'decrypt_value' and on the 'doCookieAuth' functions in all versions up to, and including, 4.3.2. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they previously used the login via the plugin API. This can only be exploited if the 'openssl' php extension is not loaded on the server.
0
Attacker Value
Unknown
CVE-2024-30522
Disclosure Date: May 17, 2024 (last updated May 17, 2024)
Authentication Bypass by Spoofing vulnerability in Stefano Lissa & The Newsletter Team Newsletter allows Functionality Bypass.This issue affects Newsletter: from n/a through 8.2.0.
0
Attacker Value
Unknown
CVE-2023-31234
Disclosure Date: May 07, 2024 (last updated May 08, 2024)
Missing Authorization vulnerability in Tilda Publishing.This issue affects Tilda Publishing: from n/a through 0.3.23.
0
Attacker Value
Unknown
CVE-2024-24856
Disclosure Date: April 17, 2024 (last updated May 29, 2024)
The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a
successful allocation, but the subsequent code directly dereferences the
pointer that receives it, which may lead to null pointer dereference.
To fix this issue, a null pointer check should be added. If it is null,
return exception code AE_NO_MEMORY.
0
Attacker Value
Unknown
CVE-2024-31434
Disclosure Date: April 15, 2024 (last updated April 15, 2024)
Cross-Site Request Forgery (CSRF) vulnerability in Stefano Lissa & The Newsletter Team Newsletter.This issue affects Newsletter: from n/a through 8.0.6.
0
Attacker Value
Unknown
CVE-2024-2336
Disclosure Date: April 09, 2024 (last updated April 10, 2024)
The Popup Maker – Popup for opt-ins, lead gen, & more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.18.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0