Show filters
157 Total Results
Displaying 1-10 of 157
Sort by:
Attacker Value
Unknown

CVE-2023-22708

Disclosure Date: December 09, 2024 (last updated December 21, 2024)
Missing Authorization vulnerability in Karim Salman Kraken.io Image Optimizer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Kraken.io Image Optimizer: from n/a through 2.6.7.
0
Attacker Value
Unknown

CVE-2023-0619

Disclosure Date: February 01, 2023 (last updated October 08, 2023)
The Kraken.io Image Optimizer plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset image optimizations.
Attacker Value
Unknown

CVE-2022-47747

Disclosure Date: January 20, 2023 (last updated October 08, 2023)
kraken <= 0.1.4 has an arbitrary file read vulnerability via the component testfs.
Attacker Value
Unknown

CVE-2022-38454

Disclosure Date: September 23, 2022 (last updated October 08, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in Kraken.io Image Optimizer plugin <= 2.6.5 at WordPress.
Attacker Value
Unknown

CVE-2022-1561

Disclosure Date: July 29, 2022 (last updated October 08, 2023)
Lura and KrakenD-CE versions older than v2.0.2 and KrakenD-EE versions older than v2.0.0 do not sanitize URL parameters correctly, allowing a malicious user to alter the backend URL defined for a pipe when remote users send crafty URL requests. The vulnerability does not affect KrakenD itself, but the consumed backend might be vulnerable.
Attacker Value
Unknown

CVE-2020-8130

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
Attacker Value
Unknown

CVE-2020-2122

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Jenkins Brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability exploitable by users able to control the Brakeman post-build step input data.
Attacker Value
Unknown

CVE-2019-16060

Disclosure Date: September 06, 2019 (last updated November 27, 2024)
The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected).
0
Attacker Value
Unknown

CVE-2016-10530

Disclosure Date: May 31, 2018 (last updated November 26, 2024)
The airbrake module 0.3.8 and earlier defaults to sending environment variables over HTTP. Environment variables can often times contain secret keys and other sensitive values. A malicious user could be on the same network as a regular user and intercept all the secret keys the user is sending. This goes against common best practice, which is to use HTTPS.
0
Attacker Value
Unknown

CVE-2014-7106

Disclosure Date: October 19, 2014 (last updated October 05, 2023)
The Orakel-Ball (aka com.wOrakelball) application 0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0