Show filters
242 Total Results
Displaying 161-170 of 242
Sort by:
Attacker Value
Unknown
CVE-2021-39319
Disclosure Date: December 13, 2021 (last updated February 23, 2025)
The duoFAQ - Responsive, Flat, Simple FAQ WordPess plugin is vulnerable to Reflected Cross-Site Scripting via the msg parameter found in the ~/duogeek/duogeek-panel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.8.
0
Attacker Value
Unknown
CVE-2021-24398
Disclosure Date: September 20, 2021 (last updated February 23, 2025)
The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice.
0
Attacker Value
Unknown
CVE-2021-24457
Disclosure Date: August 02, 2021 (last updated February 23, 2025)
The get_portfolios() and get_portfolio_attributes() functions in the class-portfolio-responsive-gallery-list-table.php and class-portfolio-responsive-gallery-attributes-list-table.php files of the Portfolio Responsive Gallery WordPress plugin before 1.1.8 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard
0
Attacker Value
Unknown
CVE-2021-25206
Disclosure Date: July 23, 2021 (last updated February 23, 2025)
Arbitrary file upload vulnerability in SourceCodester Responsive Ordering System v 1.0 allows attackers to execute arbitrary code via the file upload to Product_model.php.
0
Attacker Value
Unknown
CVE-2021-24162
Disclosure Date: April 05, 2021 (last updated February 22, 2025)
In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site.
0
Attacker Value
Unknown
CVE-2021-24161
Disclosure Date: April 05, 2021 (last updated February 22, 2025)
In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into uploading a zip archive containing malicious PHP files. The attacker could then access those files to achieve remote code execution and further infect the targeted site.
0
Attacker Value
Unknown
CVE-2021-24160
Disclosure Date: April 05, 2021 (last updated February 22, 2025)
In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site.
0
Attacker Value
Unknown
CVE-2020-12073
Disclosure Date: April 23, 2020 (last updated February 21, 2025)
The responsive-add-ons plugin before 2.2.7 for WordPress has incorrect access control for wp-admin/admin-ajax.php?action= requests.
0
Attacker Value
Unknown
CVE-2020-11673
Disclosure Date: April 13, 2020 (last updated February 21, 2025)
An issue was discovered in the Responsive Poll through 1.3.4 for Wordpress. It allows an unauthenticated user to manipulate polls, e.g., delete, clone, or view a hidden poll. This is due to the usage of the callback wp_ajax_nopriv function in Includes/Total-Soft-Poll-Ajax.php for sensitive operations.
0
Attacker Value
Unknown
CVE-2020-11106
Disclosure Date: March 30, 2020 (last updated February 21, 2025)
An issue was discovered in Responsive Filemanager through 9.14.0. In the dialog.php page, the session variable $_SESSION['RF']["view_type"] wasn't sanitized if it was already set. This made stored XSS possible if one opens ajax_calls.php and uses the "view" action and places a payload in the type parameter, and then returns to the dialog.php page. This occurs because ajax_calls.php was also able to set the $_SESSION['RF']["view_type"] variable, but there it wasn't sanitized.
0