Show filters
93 Total Results
Displaying 31-40 of 93
Sort by:
Attacker Value
Unknown

CVE-2023-23710

Disclosure Date: April 25, 2023 (last updated February 24, 2025)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin <= 7.5.14 versions.
Attacker Value
Unknown

CVE-2023-0738

Disclosure Date: April 04, 2023 (last updated February 24, 2025)
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
Attacker Value
Unknown

CVE-2023-1093

Disclosure Date: March 27, 2023 (last updated October 08, 2023)
The OAuth Single Sign On WordPress plugin before 6.24.2 does not have CSRF checks when discarding Identify providers (IdP), which could allow attackers to make logged in admins delete all IdP via a CSRF attack
Attacker Value
Unknown

CVE-2023-1092

Disclosure Date: March 27, 2023 (last updated October 08, 2023)
The OAuth Single Sign On Free WordPress plugin before 6.24.2, OAuth Single Sign On Standard WordPress plugin before 28.4.9, OAuth Single Sign On Premium WordPress plugin before 38.4.9 and OAuth Single Sign On Enterprise WordPress plugin before 48.4.9 do not have CSRF checks when deleting Identity Providers (IdP), which could allow attackers to make logged in admins delete arbitrary IdP via a CSRF attack
Attacker Value
Unknown

CVE-2022-3568

Disclosure Date: February 10, 2023 (last updated February 24, 2025)
The ImageMagick Engine plugin for WordPress is vulnerable to deserialization of untrusted input via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
Attacker Value
Unknown

CVE-2023-0624

Disclosure Date: February 09, 2023 (last updated February 24, 2025)
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
Attacker Value
Unknown

CVE-2023-0454

Disclosure Date: February 01, 2023 (last updated February 24, 2025)
OrangeScrum version 2.0.11 allows an authenticated external attacker to delete arbitrary local files from the server. This is possible because the application uses an unsanitized attacker-controlled parameter to construct an internal path.
Attacker Value
Unknown

CVE-2022-4496

Disclosure Date: January 30, 2023 (last updated October 08, 2023)
The SAML SSO Standard WordPress plugin version 16.0.0 before 16.0.8, SAML SSO Premium WordPress plugin version 12.0.0 before 12.1.0 and SAML SSO Premium Multisite WordPress plugin version 20.0.0 before 20.0.7 does not validate that the redirect parameter to its SSO login endpoint points to an internal site URL, making it vulnerable to an Open Redirect issue when the user is already logged in.
Attacker Value
Unknown

CVE-2023-0164

Disclosure Date: January 18, 2023 (last updated February 24, 2025)
OrangeScrum version 2.0.11 allows an authenticated external attacker to execute arbitrary commands on the server. This is possible because the application injects an attacker-controlled parameter into a system function.
Attacker Value
Unknown

CVE-2023-23749

Disclosure Date: January 17, 2023 (last updated February 24, 2025)
The 'LDAP Integration with Active Directory and OpenLDAP - NTLM & Kerberos Login' extension is vulnerable to LDAP Injection since is not properly sanitizing the 'username' POST parameter. An attacker can manipulate this paramter to dump arbitrary contents form the LDAP Database.