Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2023-44487
Disclosure Date: October 10, 2023 (last updated June 28, 2024)
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
1
Attacker Value
Unknown
CVE-2022-4974
Disclosure Date: October 16, 2024 (last updated October 16, 2024)
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
0
Attacker Value
Unknown
CVE-2022-1524
Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials.
0
Attacker Value
Unknown
CVE-2022-1521
Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
0
Attacker Value
Unknown
CVE-2022-1519
Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit.
0
Attacker Value
Unknown
CVE-2022-1518
Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure.
0
Attacker Value
Unknown
CVE-2022-1517
Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network.
0