Show filters
334,875 Total Results
Displaying 91-100 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown
CVE-2024-11404
Disclosure Date: November 20, 2024 (last updated November 21, 2024)
Unrestricted Upload of File with Dangerous Type, Improper Input Validation, Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in django CMS Association django Filer allows Input Data Manipulation, Stored XSS.This issue affects django Filer: from 3 before 3.3.
0
Attacker Value
Unknown
CVE-2024-10520
Disclosure Date: November 20, 2024 (last updated November 21, 2024)
The WP Project Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check in the 'check' method of the 'Create_Milestone', 'Create_Task_List', 'Create_Task', and 'Delete_Task' classes in version 2.6.14. This makes it possible for unauthenticated attackers to create milestones, create task lists, create tasks, or delete tasks in any project. NOTE: Version 2.6.14 implemented a partial fix for this vulnerability.
0
Attacker Value
Unknown
CVE-2024-48899
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
A vulnerability was found in Moodle. Additional checks are required to ensure users can only fetch the list of course badges for courses that they are intended to have access to.
0
Attacker Value
Unknown
CVE-2024-45691
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to "magic hash" values.
0
Attacker Value
Unknown
CVE-2024-45690
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
A flaw was found in Moodle. Additional checks were required to ensure users can only delete their OAuth2-linked accounts.
0
Attacker Value
Unknown
CVE-2024-45689
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access.
0
Attacker Value
Unknown
CVE-2024-10872
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `template-post-custom-field` block in all versions up to, and including, 2.0.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2024-10382
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
There exists a code execution vulnerability in the Car App Android Jetpack Library. In the CarAppService desrialization logic is used that allows for arbitrary java classes to be constructed. In combination with other gadgets, this can lead to arbitrary code execution. An attacker needs to have an app on a victims Android device that uses the CarAppService Class and the victim would need to install a malicious app alongside it. We recommend upgrading the library past version 1.7.0-beta02
0
Attacker Value
Unknown
CVE-2024-11494
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
**UNSUPPORTED WHEN ASSIGNED** The improper authentication vulnerability in the Zyxel P-6101C ADSL modem firmware version P-6101CSA6AP_20140331 could allow an unauthenticated attacker to read some device information via a crafted HTTP HEAD method.
0
Attacker Value
Unknown
CVE-2024-11179
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to SQL Injection via the 'status_type' parameter in all versions up to, and including, 4.15.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
0