Show filters
29 Total Results
Displaying 21-29 of 29
Sort by:
Attacker Value
Unknown
CVE-2023-27419
Disclosure Date: May 10, 2023 (last updated February 24, 2025)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Everest themes Viable Blog theme <= 1.1.4 versions.
0
Attacker Value
Unknown
CVE-2023-23987
Disclosure Date: April 06, 2023 (last updated February 24, 2025)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPEverest User Registration plugin <= 2.3.0 versions.
0
Attacker Value
Unknown
CVE-2022-3912
Disclosure Date: December 12, 2022 (last updated February 24, 2025)
The User Registration WordPress plugin before 2.2.4.1 does not properly restrict the files to be uploaded via an AJAX action available to both unauthenticated and authenticated users, which could allow unauthenticated users to upload PHP files for example.
0
Attacker Value
Unknown
CVE-2021-24689
Disclosure Date: February 28, 2022 (last updated February 23, 2025)
The Contact Forms - Drag & Drop Contact Form Builder WordPress plugin through 1.0.5 allows high privilege users to download arbitrary files from the web server via a path traversal attack
0
Attacker Value
Unknown
CVE-2021-24907
Disclosure Date: December 21, 2021 (last updated February 23, 2025)
The Contact Form, Drag and Drop Form Builder for WordPress plugin before 1.8.0 does not escape the status parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue
0
Attacker Value
Unknown
CVE-2021-24654
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
The User Registration WordPress plugin before 2.0.2 does not properly sanitise the user_registration_profile_pic_url value when submitted directly via the user_registration_update_profile_details AJAX action. This could allow any authenticated user, such as subscriber, to perform Stored Cross-Site attacks when their profile is viewed
0
Attacker Value
Unknown
CVE-2019-13575
Disclosure Date: July 18, 2019 (last updated November 27, 2024)
A SQL injection vulnerability exists in WPEverest Everest Forms plugin for WordPress through 1.4.9. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via includes/evf-entry-functions.php
0
Attacker Value
Unknown
CVE-2015-6454
Disclosure Date: September 26, 2015 (last updated October 05, 2023)
Everest PeakHMI before 8.7.0.2, when the video server is used, allows remote attackers to cause a denial of service (incorrect pointer dereference and daemon crash) via a crafted packet.
0
Attacker Value
Unknown
CVE-2014-7558
Disclosure Date: October 20, 2014 (last updated October 05, 2023)
The Everest Poker (aka com.wEverestPoker) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0