Show filters
46 Total Results
Displaying 21-30 of 46
Sort by:
Attacker Value
Unknown

CVE-2023-47754

Disclosure Date: December 19, 2023 (last updated December 23, 2023)
Missing Authorization vulnerability in Clever plugins Delete Duplicate Posts allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Delete Duplicate Posts: from n/a through 4.8.9.
Attacker Value
Unknown

CVE-2023-34386

Disclosure Date: November 09, 2023 (last updated November 15, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in WPClever WPC Smart Wishlist for WooCommerce plugin <= 4.7.1 versions.
Attacker Value
Unknown

CVE-2023-2507

Disclosure Date: July 15, 2023 (last updated October 08, 2023)
CleverTap Cordova Plugin version 2.6.2 allows a remote attacker to execute JavaScript code in any application that is opened via a specially constructed deeplink by an attacker. This is possible because the plugin does not correctly validate the data coming from the deeplinks before using them.
Attacker Value
Unknown

CVE-2022-31106

Disclosure Date: June 28, 2022 (last updated October 07, 2023)
Underscore.deep is a collection of Underscore mixins that operate on nested objects. Versions of `underscore.deep` prior to version 0.5.3 are vulnerable to a prototype pollution vulnerability. An attacker can craft a malicious payload and pass it to `deepFromFlat`, which would pollute any future Objects created. Any users that have `deepFromFlat` or `deepPick` (due to its dependency on `deepFromFlat`) in their code should upgrade to version 0.5.3 as soon as possible. Users unable to upgrade may mitigate this issue by modifying `deepFromFlat` to prevent specific keywords which will prevent this from happening.
Attacker Value
Unknown

CVE-2022-31053

Disclosure Date: June 13, 2022 (last updated November 08, 2023)
Biscuit is an authentication and authorization token for microservices architectures. The Biscuit specification version 1 contains a vulnerable algorithm that allows malicious actors to forge valid Γ-signatures. Such an attack would allow an attacker to create a token with any access level. The version 2 of the specification mandates a different algorithm than gamma signatures and as such is not affected by this vulnerability. The Biscuit implementations in Rust, Haskell, Go, Java and Javascript all have published versions following the v2 specification. There are no known workarounds for this issue.
Attacker Value
Unknown

CVE-2022-1465

Disclosure Date: May 16, 2022 (last updated February 23, 2025)
The WPC Smart Wishlist for WooCommerce WordPress plugin before 2.9.9 does not sanitise and escape a parameter before outputting it back in an attribute via an AJAX action, leading to a Reflected Cross-Site Scripting issue.
Attacker Value
Unknown

CVE-2022-0397

Disclosure Date: March 28, 2022 (last updated February 23, 2025)
The WPC Smart Wishlist for WooCommerce WordPress plugin before 2.9.4 does not sanitise and escape the key parameter before outputting it back in the wishlist_quickview AJAX action's response (available to any authenticated user), leading to a Reflected Cross-Site Scripting
Attacker Value
Unknown

CVE-2021-24747

Disclosure Date: December 13, 2021 (last updated February 23, 2025)
The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections.
Attacker Value
Unknown

CVE-2021-24273

Disclosure Date: May 05, 2021 (last updated February 22, 2025)
The “Clever Addons for Elementor” WordPress Plugin before 2.1.0 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
Attacker Value
Unknown

Multiple SAML libraries may allow authentication bypass via incorrect XML cano…

Disclosure Date: April 17, 2019 (last updated November 27, 2024)
Clever saml2-js 2.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
0