Lucene search

K

Dash Security Vulnerabilities

cve
cve

CVE-2024-4942

The Custom Dash plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and.....

4.4CVSS

6AI Score

0.0004EPSS

2024-06-06 02:15 AM
3
cve
cve

CVE-2024-33652

Missing Authorization vulnerability in Real Big Plugins Client Dash.This issue affects Client Dash: from n/a through...

5.3CVSS

6.8AI Score

0.0004EPSS

2024-04-29 08:15 AM
22
cve
cve

CVE-2024-21485

Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to....

6.5CVSS

5AI Score

0.001EPSS

2024-02-02 05:15 AM
85
cve
cve

CVE-2023-49165

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Real Big Plugins Client Dash allows Stored XSS.This issue affects Client Dash: from n/a through...

5.9CVSS

5.8AI Score

0.0004EPSS

2023-12-15 02:15 PM
36
cve
cve

CVE-2023-45866

Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such...

6.3CVSS

6.9AI Score

0.001EPSS

2023-12-08 06:15 AM
387
cve
cve

CVE-2023-34561

A buffer overflow in the level parsing code of RobTop Games AB Geometry Dash v2.113 allows attackers to execute arbitrary code via entering a Geometry Dash...

9.8CVSS

9.8AI Score

0.002EPSS

2023-07-11 01:15 PM
10
cve
cve

CVE-2023-0847

The Sub-IoT implementation of the DASH 7 Alliance protocol has a vulnerability that can lead to an out-of-bounds write prior to implementation version 0.5.0. If the protocol has been compiled using default settings, this will only grant the attacker access to allocated but unused memory. However,.....

8.1CVSS

8.3AI Score

0.004EPSS

2023-03-01 12:15 AM
22
cve
cve

CVE-2022-4735

A vulnerability classified as problematic was found in asrashley dash-live. This vulnerability affects the function ready of the file static/js/media.js of the component DOM Node Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is....

6.1CVSS

6AI Score

0.001EPSS

2022-12-25 04:15 PM
29
cve
cve

CVE-2017-1000473

Linux Dash up to version v2 is vulnerable to multiple command injection vulnerabilities in the way module names are parsed and then executed resulting in code execution on the server, potentially as...

7.8CVSS

8.1AI Score

0.0005EPSS

2022-10-03 04:23 PM
23
cve
cve

CVE-2021-23460

The package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key...

7.5CVSS

7.4AI Score

0.006EPSS

2022-01-21 08:15 PM
32
cve
cve

CVE-2019-16752

An issue was discovered in Decentralized Anonymous Payment System (DAPS) through 2019-08-26. It is possible to force wallets to send HTTP requests to arbitrary locations, both on the local network and on the internet. This is a serious threat to user privacy, since it can possibly leak their IP...

4.3CVSS

4.6AI Score

0.001EPSS

2019-12-04 08:15 PM
15
cve
cve

CVE-2019-17071

The client-dash (aka Client Dash) plugin 2.1.4 for WordPress allows...

6.1CVSS

5.8AI Score

0.001EPSS

2019-10-10 12:10 PM
78
cve
cve

CVE-2014-6945

The Neeku Naaku Dash Dash (aka com.dakshaa.nndd) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted...

6AI Score

0.0005EPSS

2014-10-15 10:55 AM
13
cve
cve

CVE-2009-0854

Untrusted search path vulnerability in dash 0.5.4, when used as a login shell, allows local users to execute arbitrary code via a Trojan horse .profile file in the current working...

7.1AI Score

0.0004EPSS

2009-03-11 02:19 PM
28