CVE
stringlengths 13
16
| Description
stringlengths 20
3.95k
| KeyPhrases
stringlengths 2
343
|
---|---|---|
CVE-2024-2113
|
The Ninja Forms Contact Form The Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.0. This is due to missing or incorrect nonce validation on the nf_download_all_subs AJAX action. This makes it possible for unauthenticated attackers to trigger an export of a form's submission to a publicly accessible location via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
['cross-site request forgery']
|
CVE-2024-2116
|
The Christmas Greetings plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the code parameter in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
['inject arbitrary web scripts', 'reflected cross-site scripting']
|
CVE-2024-2120
|
The Elementor Website Builder More than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Post Navigation widget in all versions up to, and including, 3.20.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-2121
|
The Elementor Website Builder Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Media Carousel widget in all versions up to, and including, 3.20.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-2123
|
The Ultimate Member User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the several parameters in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-2124
|
The Translate WordPress and go Multilingual Weglot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget/block in all versions up to, and including, 4.2.5 due to insufficient input sanitization and output escaping on user supplied attributes such as 'className'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-2126
|
The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Registration Form widget in all versions up to, and including, 2.10.32 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-2127
|
The Page Builder: Pagelayer Drag and Drop website builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom attributes in all versions up to, and including, 1.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-2128
|
The EmbedPress Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's embed widget in all versions up to, and including, 3.9.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-2129
|
The WPBITS Addons For Elementor Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's heading widget in all versions up to, and including, 1.3.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-2130
|
The CWW Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Module2 widget in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-21304
|
Trusted Compute Base Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21305
|
Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability
|
['Security Feature Bypass', 'security feature bypass']
|
CVE-2024-21306
|
Microsoft Bluetooth Driver Spoofing Vulnerability
|
['bluetooth driver spoofing']
|
CVE-2024-21307
|
Remote Desktop Client Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21309
|
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
|
['windows kernel-mode driver elevation of privilege']
|
CVE-2024-2131
|
The Move Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's infobox and button widget in all versions up to, and including, 1.2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-21310
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
|
['windows cloud files mini filter driver elevation of privilege']
|
CVE-2024-21311
|
Windows Cryptographic Services Information Disclosure Vulnerability
|
['information disclosure']
|
CVE-2024-21312
|
.NET Framework Denial of Service Vulnerability
|
['.net framework denial of service']
|
CVE-2024-21313
|
Windows TCP/IP Information Disclosure Vulnerability
|
['windows tcp ip information disclosure']
|
CVE-2024-21314
|
Microsoft Message Queuing Information Disclosure Vulnerability
|
['message queuing information disclosure']
|
CVE-2024-21315
|
Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21316
|
Windows Server Key Distribution Service Security Feature Bypass
|
['Security Feature Bypass', 'security feature bypass']
|
CVE-2024-21318
|
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21319
|
Microsoft Identity Denial of service vulnerability
|
['denial of service']
|
CVE-2024-21320
|
Windows Themes Spoofing Vulnerability
|
['windows themes spoofing']
|
CVE-2024-21325
|
Microsoft Printer Metadata Troubleshooter Tool Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21326
|
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21327
|
Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability
|
['customer engagement cross-site scripting']
|
CVE-2024-21328
|
Dynamics 365 Sales Spoofing Vulnerability
|
['sales spoofing']
|
CVE-2024-21329
|
Azure Connected Machine Agent Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-2133
|
A vulnerability, which was classified as problematic, was found in Bdtask Isshue Multi Store eCommerce Shopping Cart Solution 4.0. This affects an unknown part of the file /dashboard/Cinvoice/manage_invoice of the component Manage Sale Page. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255495.
|
['cross site scripting', 'cross-site scripting']
|
CVE-2024-21330
|
Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21334
|
Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21336
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability
|
['spoofing']
|
CVE-2024-21337
|
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21338
|
Windows Kernel Elevation of Privilege Vulnerability
|
['windows kernel elevation of privilege']
|
CVE-2024-21339
|
Windows USB Generic Parent Driver Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-2134
|
A vulnerability has been found in Bdtask Hospita AutoManager up to 20240223 and classified as problematic. This vulnerability affects unknown code of the file /investigation/delete/ of the component Investigation Report Handler. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255496. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
['cross-site request forgery', 'cross site request forgery', 'disclosure']
|
CVE-2024-21340
|
Windows Kernel Information Disclosure Vulnerability
|
['windows kernel information disclosure']
|
CVE-2024-21341
|
Windows Kernel Remote Code Execution Vulnerability
|
['windows kernel remote code execution']
|
CVE-2024-21342
|
Windows DNS Client Denial of Service Vulnerability
|
['denial of service']
|
CVE-2024-21343
|
Windows Network Address Translation (NAT) Denial of Service Vulnerability
|
['windows network address translation (nat)', 'denial of service']
|
CVE-2024-21344
|
Windows Network Address Translation (NAT) Denial of Service Vulnerability
|
['windows network address translation (nat)', 'denial of service']
|
CVE-2024-21345
|
Windows Kernel Elevation of Privilege Vulnerability
|
['windows kernel elevation of privilege']
|
CVE-2024-21346
|
Win32k Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21347
|
Microsoft ODBC Driver Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21348
|
Internet Connection Sharing (ICS) Denial of Service Vulnerability
|
['internet connection sharing (ics) denial of service']
|
CVE-2024-21349
|
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-2135
|
A vulnerability was found in Bdtask Hospita AutoManager up to 20240223 and classified as problematic. This issue affects some unknown processing of the file /hospital_activities/birth/form of the component Hospital Activities Page. The manipulation of the argument Description with the input <img src=a onerror=alert(1)> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255497 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
['cross site scripting', 'disclosure']
|
CVE-2024-21350
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21351
|
Windows SmartScreen Security Feature Bypass Vulnerability
|
['Security Feature Bypass', 'windows smartscreen security feature bypass']
|
CVE-2024-21352
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21353
|
Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21354
|
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21355
|
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21356
|
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
|
['denial of service']
|
CVE-2024-21357
|
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21358
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21359
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-2136
|
The WPKoi Templates for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Advanced Heading widget in all versions up to, and including, 2.5.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-21360
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21361
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21362
|
Windows Kernel Security Feature Bypass Vulnerability
|
['Security Feature Bypass', 'windows kernel security feature bypass']
|
CVE-2024-21363
|
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21364
|
Microsoft Azure Site Recovery Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21365
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21366
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21367
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21368
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21369
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21370
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21371
|
Windows Kernel Elevation of Privilege Vulnerability
|
['windows kernel elevation of privilege']
|
CVE-2024-21372
|
Windows OLE Remote Code Execution Vulnerability
|
['windows ole remote code execution']
|
CVE-2024-21374
|
Microsoft Teams for Android Information Disclosure Vulnerability
|
['information disclosure']
|
CVE-2024-21375
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21376
|
Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21377
|
Windows DNS Information Disclosure Vulnerability
|
['windows dns information disclosure']
|
CVE-2024-21378
|
Microsoft Outlook Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21379
|
Microsoft Word Remote Code Execution Vulnerability
|
['microsoft word remote code execution']
|
CVE-2024-21380
|
Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability
|
['information disclosure']
|
CVE-2024-21381
|
Microsoft Azure Active Directory B2C Spoofing Vulnerability
|
['spoofing']
|
CVE-2024-21382
|
Microsoft Edge for Android Information Disclosure Vulnerability
|
['information disclosure']
|
CVE-2024-21383
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability
|
['spoofing']
|
CVE-2024-21384
|
Microsoft Office OneNote Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21385
|
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21386
|
.NET Denial of Service Vulnerability
|
['denial of service']
|
CVE-2024-21387
|
Microsoft Edge for Android Spoofing Vulnerability
|
['spoofing']
|
CVE-2024-21388
|
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21389
|
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
|
['cross-site scripting']
|
CVE-2024-2139
|
The Master Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Pricing Table widget in all versions up to, and including, 2.0.5.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
['inject arbitrary web scripts', 'stored cross-site scripting']
|
CVE-2024-21390
|
Microsoft Authenticator Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
CVE-2024-21391
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
['remote code execution']
|
CVE-2024-21392
|
.NET and Visual Studio Denial of Service Vulnerability
|
['denial of service']
|
CVE-2024-21393
|
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
|
['cross-site scripting']
|
CVE-2024-21394
|
Dynamics 365 Field Service Spoofing Vulnerability
|
['field service spoofing']
|
CVE-2024-21395
|
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
|
['cross-site scripting']
|
CVE-2024-21396
|
Dynamics 365 Sales Spoofing Vulnerability
|
['sales spoofing']
|
CVE-2024-21397
|
Microsoft Azure File Sync Elevation of Privilege Vulnerability
|
['elevation of privilege']
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.