Show filters
70 Total Results
Displaying 31-40 of 70
Sort by:
Attacker Value
Unknown

CVE-2023-6029

Disclosure Date: January 15, 2024 (last updated January 20, 2024)
The EazyDocs WordPress plugin before 2.3.6 does not have authorization and CSRF checks when handling documents and does not ensure that they are documents from the plugin, allowing unauthenticated users to delete arbitrary posts, as well as add and delete documents/sections.
Attacker Value
Unknown

CVE-2024-22048

Disclosure Date: January 04, 2024 (last updated January 12, 2024)
govuk_tech_docs versions from 2.0.2 to before 3.3.1 are vulnerable to a cross-site scripting vulnerability. Malicious JavaScript may be executed in the user's browser if a malicious search result is displayed on the search page.
Attacker Value
Unknown

CVE-2023-6035

Disclosure Date: December 11, 2023 (last updated December 14, 2023)
The EazyDocs WordPress plugin before 2.3.4 does not properly sanitize and escape "data" parameter before using it in an SQL statement via an AJAX action, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks.
Attacker Value
Unknown

CVE-2023-47549

Disclosure Date: November 14, 2023 (last updated November 21, 2023)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability on 302 response page in spider-themes EazyDocs plugin <= 2.3.3 versions.
Attacker Value
Unknown

CVE-2023-32106

Disclosure Date: August 18, 2023 (last updated October 08, 2023)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fahad Mahmood WP Docs plugin <= 1.9.9 versions.
Attacker Value
Unknown

CVE-2022-4511

Disclosure Date: December 15, 2022 (last updated October 08, 2023)
A vulnerability has been found in RainyGao DocSys and classified as critical. Affected by this vulnerability is an unknown functionality of the component com.DocSystem.controller.UserController#getUserImg. The manipulation leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215851.
Attacker Value
Unknown

CVE-2022-4402

Disclosure Date: December 11, 2022 (last updated October 08, 2023)
A vulnerability classified as critical has been found in RainyGao DocSys 2.02.37. This affects an unknown part of the component ZIP File Decompression Handler. The manipulation leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215271.
Attacker Value
Unknown

CVE-2022-31526

Disclosure Date: July 11, 2022 (last updated February 24, 2025)
The ThundeRatz/ThunderDocs repository through 2020-05-01 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Attacker Value
Unknown

CVE-2022-23376

Disclosure Date: February 19, 2022 (last updated February 23, 2025)
WikiDocs version 0.1.18 has multiple reflected XSS vulnerabilities on different pages.
Attacker Value
Unknown

CVE-2022-23375

Disclosure Date: February 19, 2022 (last updated February 23, 2025)
WikiDocs version 0.1.18 has an authenticated remote code execution vulnerability. An attacker can upload a malicious file using the image upload form through index.php.