眈眈探求 |
+ 2024-08-31 00:15:05 |
In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400. |
详情 |
-
- 489ba602cc77ce257d145bec011a9e70 |
- CVE-2024-8319 |
- 2024-08-30 07:33:09 |
- The Tourfic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.11.20. This is due to missing or incorrect nonce validation on the tf_order_status_email_resend_function, tf_visitor_details_edit_function, tf_checkinout_details_edit_function, tf_order_status_edit_function, tf_order_bulk_action_edit_function, tf_remove_room_order_ids, and tf_delete_old_review_fields functions. This makes it possible for unauthenticated attackers to resend order status emails, update visitor/order details, edit check-in/out details, edit order status, perform bulk order status updates, remove room order IDs, and delete old review fields, respectively, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
- 详情 |
-
-
-
- 27301d34a81376401edf262b1b1223f4 |
- CVE-2024-8016 |
- 2024-08-30 07:15:12 |
- The Events Calendar Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 7.0.2 via deserialization of untrusted input from the 'filters' parameter in widgets. This makes it possible for authenticated attackers, with administrator-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely. In certain configurations, this can be exploitable by lower level users. We confirmed that this plugin installed with Elementor makes it possible for users with contributor-level access and above to exploit this issue. |
- 详情 |
-
-
-
- 3b56b4785012fc035f088dc2f5a3e82d |
- CVE-2024-42412 |
- 2024-08-30 07:15:12 |
- Cross-site scripting vulnerability exists in WAB-I1750-PS and WAB-S1167-PS due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser. |
- 详情 |
-
-
-
- e4925f066a2af72374267b00e67d1348 |
- CVE-2024-39300 |
- 2024-08-30 07:15:11 |
- Missing authentication vulnerability exists in Telnet function of WAB-I1750-PS v1.5.10 and earlier. When Telnet function of the product is enabled, a remote attacker may login to the product without authentication and alter the product's settings. |
- 详情 |
-
-
-
- f88c337fc12cc8f31b2f852a9f696e2a |
- CVE-2024-34577 |
- 2024-08-30 07:15:11 |
- Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B due to improper processing of input values in easysetup.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser. |
- 详情 |
-
-
-
- e699e3816cfba6f2fa0b7f987a1d2341 |
- CVE-2024-8333 |
- 2024-08-30 06:15:05 |
- Rejected reason: Test CVE |
- 详情 |
-
-
-
- 2df67382b43bee1a8088579c94bc3407 |
- CVE-2024-3673 |
- 2024-08-30 06:15:05 |
- The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues. |
- 详情 |
-
-
-
- 89ff02c0a8cf88db2b22797dbe4cfcd6 |
- CVE-2024-5879 |
- 2024-08-30 05:15:12 |
- The HubSpot – CRM, Email Marketing, Live Chat, Forms & Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute of the HubSpot Meeting Widget in all versions up to, and including, 11.1.22 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
- 详情 |
-
-
-
- 67b6cdc8def27a81c8c466593b5c1b74 |
- CVE-2024-3998 |
- 2024-08-30 05:15:12 |
- The Betheme theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 27.5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
- 详情 |
-
-
-
- 49cb3ef41a4bc6e73e4c1b6e46a71183 |
- CVE-2024-2694 |
- 2024-08-30 05:15:12 |
- The Betheme theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 27.5.6 via deserialization of untrusted input of the 'mfn-page-items' post meta value. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. |
- 详情 |
-
-