Show filters
13,174 Total Results
Displaying 961-970 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2021-43584

Disclosure Date: January 24, 2024 (last updated February 01, 2024)
DOM-based Cross Site Scripting (XSS vulnerability in 'Tail Event Logs' functionality in Nagios Nagios Cross-Platform Agent (NCPA) before 2.4.0 allows attackers to run arbitrary code via the name element when filtering for a log.
Attacker Value
Unknown

CVE-2024-22720

Disclosure Date: January 24, 2024 (last updated January 31, 2024)
Kanboard 1.2.34 is vulnerable to Html Injection in the group management feature.
Attacker Value
Unknown

CVE-2024-22152

Disclosure Date: January 24, 2024 (last updated January 31, 2024)
Unrestricted Upload of File with Dangerous Type vulnerability in WebToffee Product Import Export for WooCommerce.This issue affects Product Import Export for WooCommerce: from n/a through 2.3.7.
Attacker Value
Unknown

CVE-2024-22135

Disclosure Date: January 24, 2024 (last updated January 31, 2024)
Unrestricted Upload of File with Dangerous Type vulnerability in WebToffee Order Export & Order Import for WooCommerce.This issue affects Order Export & Order Import for WooCommerce: from n/a through 2.4.3.
Attacker Value
Unknown

CVE-2024-22372

Disclosure Date: January 24, 2024 (last updated September 09, 2024)
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.
Attacker Value
Unknown

CVE-2024-22366

Disclosure Date: January 24, 2024 (last updated January 31, 2024)
Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
Attacker Value
Unknown

CVE-2023-31037

Disclosure Date: January 24, 2024 (last updated February 01, 2024)
NVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.
Attacker Value
Unknown

CVE-2024-0703

Disclosure Date: January 23, 2024 (last updated January 30, 2024)
The Sticky Buttons – floating buttons builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via sticky URLs in all versions up to, and including, 3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Attacker Value
Unknown

CVE-2023-7082

Disclosure Date: January 22, 2024 (last updated January 27, 2024)
The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution.
Attacker Value
Unknown

CVE-2023-6626

Disclosure Date: January 22, 2024 (last updated January 27, 2024)
The Product Enquiry for WooCommerce WordPress plugin before 3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)