Show filters
2,667 Total Results
Displaying 71-80 of 2,667
Sort by:
Attacker Value
Unknown
CVE-2016-4979
Disclosure Date: July 06, 2016 (last updated November 08, 2023)
The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.
1
Attacker Value
Unknown
CVE-2013-4352
Disclosure Date: July 20, 2014 (last updated October 05, 2023)
The cache_invalidate function in modules/cache/cache_storage.c in the mod_cache module in the Apache HTTP Server 2.4.6, when a caching forward proxy is enabled, allows remote HTTP servers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger a missing hostname value.
1
Attacker Value
Unknown
CVE-2025-25054
Disclosure Date: February 19, 2025 (last updated February 19, 2025)
Movable Type contains a reflected cross-site scripting vulnerability in the user information edit page. When Multi-Factor authentication plugin is enabled and a user accesses a crafted page while logged in to the affected product, an arbitrary script may be executed on the web browser of the user.
0
Attacker Value
Unknown
CVE-2025-24841
Disclosure Date: February 19, 2025 (last updated February 19, 2025)
Movable Type contains a stored cross-site scripting vulnerability in the HTML edit mode of MT Block Editor. It is exploitable when TinyMCE6 is used as a rich text editor and an arbitrary script may be executed on a logged-in user's web browser.
0
Attacker Value
Unknown
CVE-2025-22888
Disclosure Date: February 19, 2025 (last updated February 19, 2025)
Movable Type contains a stored cross-site scripting vulnerability in the custom block edit page of MT Block Editor. If exploited, an arbitrary script may be executed on a logged-in user's web browser.
0
Attacker Value
Unknown
CVE-2024-13576
Disclosure Date: February 18, 2025 (last updated February 18, 2025)
The Gumlet Video plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gumlet' shortcode in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2024-56180
Disclosure Date: February 14, 2025 (last updated February 15, 2025)
CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.
0
Attacker Value
Unknown
CVE-2024-52577
Disclosure Date: February 14, 2025 (last updated February 14, 2025)
In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side.
0
Attacker Value
Unknown
CVE-2024-46910
Disclosure Date: February 13, 2025 (last updated February 13, 2025)
An authenticated user can perform XSS and potentially impersonate another user.
This issue affects Apache Atlas versions 2.3.0 and earlier.
Users are recommended to upgrade to version 2.4.0, which fixes the issue.
0
Attacker Value
Unknown
CVE-2024-32838
Disclosure Date: February 12, 2025 (last updated February 12, 2025)
SQL Injection vulnerability in various API endpoints - offices, dashboards, etc. Apache Fineract versions 1.9 and before have a vulnerability that allows an authenticated attacker to inject malicious data into some of the REST API endpoints' query parameter.
Users are recommended to upgrade to version 1.10.1, which fixes this issue.
A SQL Validator has been implemented which allows us to configure a series of tests and checks against our SQL queries that will allow us to validate and protect against nearly all potential SQL injection attacks.
0