Show filters
914 Total Results
Displaying 91-100 of 914
Sort by:
Attacker Value
Unknown
CVE-2024-44727
Disclosure Date: September 05, 2024 (last updated September 07, 2024)
Sourcecodehero Event Management System1.0 is vulnerable to SQL Injection via the parameter 'username' in /event/admin/login.php.
0
Attacker Value
Unknown
CVE-2024-5957
Disclosure Date: September 05, 2024 (last updated September 07, 2024)
This vulnerability allows unauthenticated remote attackers to bypass authentication and gain APIs access of the Manager.
0
Attacker Value
Unknown
CVE-2024-5956
Disclosure Date: September 05, 2024 (last updated September 07, 2024)
This vulnerability allows unauthenticated remote attackers to bypass authentication and gain partial data access to the vulnerable Trellix IPS Manager with garbage data in response mostly
0
Attacker Value
Unknown
CVE-2024-7717
Disclosure Date: August 31, 2024 (last updated September 20, 2024)
The WP Events Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter in all versions up to, and including, 2.1.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
0
Attacker Value
Unknown
CVE-2024-8016
Disclosure Date: August 30, 2024 (last updated September 04, 2024)
The Events Calendar Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 7.0.2 via deserialization of untrusted input from the 'filters' parameter in widgets. This makes it possible for authenticated attackers, with administrator-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely. In certain configurations, this can be exploitable by lower level users. We confirmed that this plugin installed with Elementor makes it possible for users with contributor-level access and above to exploit this issue.
0
Attacker Value
Unknown
CVE-2024-39638
Disclosure Date: August 29, 2024 (last updated September 14, 2024)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Roundup WP Registrations for the Events Calendar allows SQL Injection.This issue affects Registrations for the Events Calendar: from n/a through 2.12.2.
0
Attacker Value
Unknown
CVE-2024-6883
Disclosure Date: August 21, 2024 (last updated August 21, 2024)
The Event Espresso 4 Decaf – Event Registration Event Ticketing plugin for WordPress is vulnerable to limited unauthorized plugin settings modification due to a missing capability check on the saveTimezoneString and some other functions in all versions up to, and including, 5.0.22.decaf. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify some of the plugin settings.
0
Attacker Value
Unknown
CVE-2024-25561
Disclosure Date: August 14, 2024 (last updated September 13, 2024)
Insecure inherited permissions in some Intel(R) HID Event Filter software installers before version 2.2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2024-43138
Disclosure Date: August 13, 2024 (last updated September 13, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in MagePeople Team Event Manager for WooCommerce allows PHP Local File Inclusion.This issue affects Event Manager for WooCommerce: from n/a through 4.2.1.
0
Attacker Value
Unknown
CVE-2024-6552
Disclosure Date: August 08, 2024 (last updated January 05, 2025)
The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.2. This is due to the plugin utilizing Symfony and leaving display_errors on within test files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
0