Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Unknown
CVE-2022-4974
Disclosure Date: October 16, 2024 (last updated October 16, 2024)
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
0
Attacker Value
Unknown
CVE-2023-51404
Disclosure Date: February 10, 2024 (last updated February 15, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MyAgilePrivacy My Agile Privacy – The only GDPR solution for WordPress that you can truly trust allows Stored XSS.This issue affects My Agile Privacy – The only GDPR solution for WordPress that you can truly trust: from n/a through 2.1.7.
0
Attacker Value
Unknown
CVE-2023-47251
Disclosure Date: November 22, 2023 (last updated December 01, 2023)
In mprivacy-tools before 2.0.406g in m-privacy TightGate-Pro Server, a Directory Traversal in the print function of the VNC service allows authenticated attackers (with access to a VNC session) to automatically transfer malicious PDF documents by moving them into the .spool directory, and then sending a signal to the VNC service, which automatically transfers them to the connected VNC client's filesystem.
0
Attacker Value
Unknown
CVE-2023-47250
Disclosure Date: November 22, 2023 (last updated December 01, 2023)
In mprivacy-tools before 2.0.406g in m-privacy TightGate-Pro Server, broken Access Control on X11 server sockets allows authenticated attackers (with access to a VNC session) to access the X11 desktops of other users by specifying their DISPLAY ID. This allows complete control of their desktop, including the ability to inject keystrokes and perform a keylogging attack.
0
Attacker Value
Unknown
CVE-2020-16261
Disclosure Date: October 28, 2020 (last updated November 28, 2024)
Winston 1.5.4 devices allow a U-Boot interrupt, resulting in local root access.
0
Attacker Value
Unknown
CVE-2020-16262
Disclosure Date: October 28, 2020 (last updated November 28, 2024)
Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation.
0
Attacker Value
Unknown
CVE-2020-16258
Disclosure Date: October 28, 2020 (last updated November 28, 2024)
Winston 1.5.4 devices make use of a Monit service (not managed during the normal user process) which is configured with default credentials.
0
Attacker Value
Unknown
CVE-2020-16259
Disclosure Date: October 28, 2020 (last updated November 28, 2024)
Winston 1.5.4 devices have an SSH user account with access from bastion hosts. This is undocumented in device documents and is not announced to the user.
0
Attacker Value
Unknown
CVE-2020-16256
Disclosure Date: October 28, 2020 (last updated November 28, 2024)
The API on Winston 1.5.4 devices is vulnerable to CSRF.
0
Attacker Value
Unknown
CVE-2020-16263
Disclosure Date: October 28, 2020 (last updated November 28, 2024)
Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins.
0