‼ CVE-2016-15007 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Centralized-Salesforce-Dev-Framework. It has been declared as problematic. Affected by this vulnerability is the function SObjectService of the file src/classes/SObjectService.cls of the component SOQL Handler. The manipulation of the argument orderDirection leads to injection. The name of the patch is db03ac5b8a9d830095991b529c067a030a0ccf7b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217195.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4237 ‼
📖 Read
via "National Vulnerability Database".
The Welcart e-Commerce WordPress plugin before 2.8.6 does not validate user input before using it in file_exist() functions via various AJAX actions available to any authenticated users, which could allow users with a role as low as subscriber to perform PHAR deserialisation when they can upload a file and a suitable gadget chain is present on the blog📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3936 ‼
📖 Read
via "National Vulnerability Database".
The Team Members WordPress plugin before 5.2.1 does not sanitize and escapes some of its settings, which could allow high-privilege users such as editors to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in a multisite setup).📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-4119 ‼
📖 Read
via "National Vulnerability Database".
The Image Optimizer, Resizer and CDN WordPress plugin before 6.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-4360 ‼
📖 Read
via "National Vulnerability Database".
The WP RSS By Publishers WordPress plugin through 0.1 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-4298 ‼
📖 Read
via "National Vulnerability Database".
The Wholesale Market WordPress plugin before 2.2.1 does not have authorisation check, as well as does not validate user input used to generate system path, allowing unauthenticated attackers to download arbitrary file from the server.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-4369 ‼
📖 Read
via "National Vulnerability Database".
The WP-Lister Lite for Amazon WordPress plugin before 2.4.4 does not sanitize and escapes a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which can be used against high-privilege users such as admin.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-4114 ‼
📖 Read
via "National Vulnerability Database".
The Superio WordPress theme does not sanitise and escape some parameters, which could allow users with a role as low as a subscriber to perform Cross-Site Scripting attacks.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-3241 ‼
📖 Read
via "National Vulnerability Database".
The Build App Online WordPress plugin before 1.0.19 does not properly sanitise and escape some parameters before using them in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-3860 ‼
📖 Read
via "National Vulnerability Database".
The Visual Email Designer for WooCommerce WordPress plugin before 1.7.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as author.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-4372 ‼
📖 Read
via "National Vulnerability Database".
The Web Invoice WordPress plugin through 2.1.3 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL Injection exploitable by high privilege users such as admin by default. However, depending on the plugin configuration, other users, such as subscriber could exploit this as well📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-4324 ‼
📖 Read
via "National Vulnerability Database".
The Custom Field Template WordPress plugin before 2.5.8 unserialises the content of an imported file, which could lead to PHP object injections issues when a high privilege user import (intentionally or not) a malicious Customizer Styling file and a suitable gadget chain is present on the blog.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-4140 ‼
📖 Read
via "National Vulnerability Database".
The Welcart e-Commerce WordPress plugin before 2.8.5 does not validate user input before using it to output the content of a file, which could allow unauthenticated attacker to read arbitrary files on the server📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4359 ‼
📖 Read
via "National Vulnerability Database".
The WP RSS By Publishers WordPress plugin through 0.1 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4142 ‼
📖 Read
via "National Vulnerability Database".
The WordPress Filter Gallery Plugin WordPress plugin before 0.1.6 does not properly escape the filters passed in the ufg_gallery_filters ajax action before outputting them on the page, allowing a high privileged user such as an administrator to inject HTML or javascript to the plugin settings page, even when the unfiltered_html capability is disabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4417 ‼
📖 Read
via "National Vulnerability Database".
The WP Cerber Security, Anti-spam & Malware Scan WordPress plugin before 9.3.3 does not properly block access to the REST API users endpoint when the blog is in a subdirectory, which could allow attackers to bypass the restriction in place and list users📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4099 ‼
📖 Read
via "National Vulnerability Database".
The Joy Of Text Lite WordPress plugin before 2.3.1 does not properly sanitise and escape some parameters before using them in SQL statements accessible to unauthenticated users, leading to unauthenticated SQL injection📖 Read
via "National Vulnerability Database".
‼ CVE-2015-10011 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as problematic has been found in OpenDNS OpenResolve. This affects an unknown part of the file resolverapi/endpoints.py. The manipulation leads to improper output neutralization for logs. The name of the patch is 9eba6ba5abd89d0e36a008921eb307fcef8c5311. It is recommended to apply a patch to fix this issue. The identifier VDB-217197 was assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4371 ‼
📖 Read
via "National Vulnerability Database".
The Web Invoice WordPress plugin through 2.1.3 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL Injection exploitable by high privilege users such as admin by default. However, depending on the plugin configuration, other users, such as subscriber could exploit this as well📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4373 ‼
📖 Read
via "National Vulnerability Database".
The Quote-O-Matic WordPress plugin through 1.0.5 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4236 ‼
📖 Read
via "National Vulnerability Database".
The Welcart e-Commerce WordPress plugin before 2.8.5 does not validate user input before using it to output the content of a file via an AJAX action available to any authenticated users, which could allow users with a role as low as subscriber to read arbitrary files on the server.📖 Read
via "National Vulnerability Database".