Show filters
100 Total Results
Displaying 31-40 of 100
Sort by:
Attacker Value
Unknown

CVE-2023-0075

Disclosure Date: February 13, 2023 (last updated October 08, 2023)
The Amazon JS WordPress plugin through 0.10 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Attacker Value
Unknown

CVE-2022-4794

Disclosure Date: January 30, 2023 (last updated October 08, 2023)
The AAWP WordPress plugin before 3.12.3 can be used to abuse trusted domains to load malware or other files through it (Reflected File Download) to bypass firewall rules in companies.
Attacker Value
Unknown

CVE-2022-4369

Disclosure Date: January 02, 2023 (last updated October 08, 2023)
The WP-Lister Lite for Amazon WordPress plugin before 2.4.4 does not sanitize and escapes a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which can be used against high-privilege users such as admin.
Attacker Value
Unknown

CVE-2021-30134

Disclosure Date: December 26, 2022 (last updated October 08, 2023)
php-mod/curl (a wrapper of the PHP cURL extension) before 2.3.2 allows XSS via the post_file_path_upload.php key parameter and the POST data to post_multidimensional.php.
Attacker Value
Unknown

CVE-2022-40968

Disclosure Date: December 04, 2022 (last updated October 08, 2023)
Reflected Cross-Site Scripting (XSS) vulnerability in 2kb Amazon Affiliates Store plugin <=2.1.5 on WordPress.
Attacker Value
Unknown

CVE-2022-41828

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name.
Attacker Value
Unknown

CVE-2022-2541

Disclosure Date: September 06, 2022 (last updated February 24, 2025)
The uContext for Amazon plugin for WordPress is vulnerable to Cross-Site Request Forgery to Cross-Site Scripting in versions up to, and including 3.9.1. This is due to missing nonce validation in the ~/app/sites/ajax/actions/keyword_save.php file that is called via the doAjax() function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Attacker Value
Unknown

CVE-2022-1830

Disclosure Date: June 20, 2022 (last updated February 23, 2025)
The Amazon Einzeltitellinks WordPress plugin through 1.3.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping
Attacker Value
Unknown

CVE-2022-1645

Disclosure Date: May 30, 2022 (last updated February 23, 2025)
The Amazon Link WordPress plugin through 3.2.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.
Attacker Value
Unknown

CVE-2022-30240

Disclosure Date: May 09, 2022 (last updated February 23, 2025)
An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Redshift JDBC Driver 1.2.40 through 1.2.55 may allow a local user to execute code. NOTE: this is different from CVE-2022-29972.