Show filters
206 Total Results
Displaying 1-10 of 206
Sort by:
Attacker Value
Unknown

CVE-2024-13554

Disclosure Date: February 12, 2025 (last updated February 25, 2025)
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the reorder_route() function in all versions up to, and including, 3.0.13. This makes it possible for unauthenticated attackers to reorder posts.
Attacker Value
Unknown

CVE-2025-24868

Disclosure Date: February 11, 2025 (last updated February 11, 2025)
The User Account and Authentication service (UAA) for SAP HANA extended application services, advanced model (SAP HANA XS advanced model) allows an unauthenticated attacker to craft a malicious link, that, when clicked by a victim, redirects the browser to a malicious site due to insufficient redirect URL validation. On successful exploitation attacker can cause limited impact on confidentiality, integrity, and availability of the system.
Attacker Value
Unknown

CVE-2025-1061

Disclosure Date: February 07, 2025 (last updated February 07, 2025)
The Nextend Social Login Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.16. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
Attacker Value
Unknown

CVE-2024-8125

Disclosure Date: February 04, 2025 (last updated February 05, 2025)
Improper Validation of Specified Type of Input vulnerability in OpenText™ Content Management (Extended ECM) allows Parameter Injection.  A bad actor with the required OpenText Content Management privileges (not root) could expose the vulnerability to carry out a remote code execution attack on the target system. This issue affects Content Management (Extended ECM): from 10.0 through 24.4  with WebReports module installed and enabled.
0
Attacker Value
Unknown

CVE-2025-23007

Disclosure Date: January 30, 2025 (last updated January 30, 2025)
A vulnerability in the NetExtender Windows client log export function allows unauthorized access to sensitive Windows system files, potentially leading to privilege escalation.
0
Attacker Value
Unknown

CVE-2024-11218

Disclosure Date: January 22, 2025 (last updated February 20, 2025)
A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.
0
Attacker Value
Unknown

CVE-2024-13184

Disclosure Date: January 18, 2025 (last updated January 18, 2025)
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to time-based SQL Injection via the Login Attempts module in all versions up to, and including, 3.0.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Attacker Value
Unknown

CVE-2024-12085

Disclosure Date: January 14, 2025 (last updated February 20, 2025)
A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
0
Attacker Value
Unknown

CVE-2024-11614

Disclosure Date: December 18, 2024 (last updated January 09, 2025)
An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset.
0
Attacker Value
Unknown

CVE-2023-32094

Disclosure Date: December 09, 2024 (last updated December 21, 2024)
Missing Authorization vulnerability in Felix Welberg Extended Post Status allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Extended Post Status: from n/a through 1.0.19.
0