Show filters
25 Total Results
Displaying 1-10 of 25
Sort by:
Attacker Value
Unknown

CVE-2023-25780

Disclosure Date: May 30, 2023 (last updated October 08, 2023)
It is identified a vulnerability of insufficient authentication in an important specific function of Status PowerBPM. A LAN attacker with normal user privilege can exploit this vulnerability to modify substitute agent to arbitrary users, resulting in serious consequence.
Attacker Value
Unknown

CVE-2022-42906

Disclosure Date: October 13, 2022 (last updated October 08, 2023)
powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001.
Attacker Value
Unknown

CVE-2022-31094

Disclosure Date: June 27, 2022 (last updated October 07, 2023)
ScratchTools is a web extension designed to make interacting with the Scratch programming language community (Scratching) easier. In affected versions anybody who uses the Recently Viewed Projects feature is vulnerable to having their account taken over if they view a project that tries to. The issue is that if a user visits a project that includes Javascript in the title, then when the Recently Viewed Projects feature displays it, it could run the Javascript. This issue has been addressed in the 2.5.2 release. Users having issues scratching should open an issue in the project issue tracker https://github.com/STForScratch/ScratchTools/
Attacker Value
Unknown

CVE-2021-24846

Disclosure Date: December 21, 2021 (last updated October 07, 2023)
The get_query() function of the Ni WooCommerce Custom Order Status WordPress plugin before 1.9.7, used by the niwoocos_ajax AJAX action, available to all authenticated users, does not properly sanitise the sort parameter before using it in a SQL statement, leading to an SQL injection, exploitable by any authenticated users, such as subscriber
Attacker Value
Unknown

CVE-2021-24662

Disclosure Date: October 25, 2021 (last updated February 23, 2025)
The Game Server Status WordPress plugin through 1.0 does not validate or escape the server_id parameter before using it in SQL statement, leading to an Authenticated SQL Injection in an admin page
Attacker Value
Unknown

CVE-2021-24670

Disclosure Date: September 27, 2021 (last updated February 23, 2025)
The CoolClock WordPress plugin before 4.3.5 does not escape some shortcode attributes, allowing users with a role as low as Contributor toperform Stored Cross-Site Scripting attacks
Attacker Value
Unknown

CVE-2014-5091

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code.
Attacker Value
Unknown

CVE-2010-4658

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
statusnet through 2010 allows attackers to spoof syslog messages via newline injection attacks.
Attacker Value
Unknown

CVE-2014-5093

Disclosure Date: January 10, 2020 (last updated February 21, 2025)
Status2k does not remove the install directory allowing credential reset.
Attacker Value
Unknown

CVE-2014-5092

Disclosure Date: January 10, 2020 (last updated February 21, 2025)
Status2k allows Remote Command Execution in admin/options/editpl.php.