Show filters
2,513 Total Results
Displaying 91-100 of 2,513
Sort by:
Attacker Value
Unknown
CVE-2023-46083
Disclosure Date: January 02, 2025 (last updated January 03, 2025)
Missing Authorization vulnerability in Kali Forms Contact Form builder with drag & drop - Kali Forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form builder with drag & drop - Kali Forms: from n/a through 2.3.27.
0
Attacker Value
Unknown
CVE-2023-45275
Disclosure Date: January 02, 2025 (last updated January 03, 2025)
Missing Authorization vulnerability in Kali Forms Contact Form builder with drag & drop - Kali Forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form builder with drag & drop - Kali Forms: from n/a through 2.3.28.
0
Attacker Value
Unknown
CVE-2024-56060
Disclosure Date: January 02, 2025 (last updated January 02, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HTML Forms allows Reflected XSS.This issue affects HTML Forms: from n/a through 1.4.1.
0
Attacker Value
Unknown
CVE-2024-55991
Disclosure Date: December 31, 2024 (last updated January 02, 2025)
Missing Authorization vulnerability in WP-CRM WP-CRM System allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP-CRM System: from n/a through 3.2.9.1.
0
Attacker Value
Unknown
CVE-2024-12839
Disclosure Date: December 31, 2024 (last updated January 02, 2025)
The login mechanism via device authentication of CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability. If a user visits a forged website, the agent program deployed on their device will send an authentication signature to the website. An unauthenticated remote attacker who obtains this signature can use it to log into the system with any device.
0
Attacker Value
Unknown
CVE-2024-12838
Disclosure Date: December 31, 2024 (last updated January 02, 2025)
The passwordless login mechanism in CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability, allowing remote attackers with regular privileges to send a crafted request to switch to the identity of any user, including administrators.
0
Attacker Value
Unknown
CVE-2024-45805
Disclosure Date: December 26, 2024 (last updated January 02, 2025)
OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate access control for support information (http://<opencti_domain>/storage/get/support/UUID/UUID.zip), and that the UUID is available to general users using an attached query (logs query). This vulnerability is fixed in 6.3.0.
0
Attacker Value
Unknown
CVE-2024-8950
Disclosure Date: December 25, 2024 (last updated January 05, 2025)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Arne Informatics Piramit Automation allows Blind SQL Injection.This issue affects Piramit Automation: before 27.09.2024.
0
Attacker Value
Unknown
CVE-2024-11230
Disclosure Date: December 23, 2024 (last updated January 30, 2025)
The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘size’ parameter in all versions up to, and including, 1.6.46 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2024-8972
Disclosure Date: December 17, 2024 (last updated December 18, 2024)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mobil365 Informatics Saha365 App allows SQL Injection.This issue affects Saha365 App: before 30.09.2024.
0