Show filters
65 Total Results
Displaying 41-50 of 65
Sort by:
Attacker Value
Unknown
CVE-2022-37411
Disclosure Date: September 01, 2022 (last updated October 08, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in Vinoj Cardoza's Captcha Code plugin <= 2.7 at WordPress.
0
Attacker Value
Unknown
CVE-2022-2184
Disclosure Date: August 01, 2022 (last updated October 08, 2023)
The CAPTCHA 4WP WordPress plugin before 7.1.0 lets user input reach a sensitive require_once call in one of its admin-side templates. This can be abused by attackers, via a Cross-Site Request Forgery attack to run arbitrary code on the server.
0
Attacker Value
Unknown
CVE-2022-34983
Disclosure Date: July 22, 2022 (last updated October 07, 2023)
The scu-captcha package in PyPI v0.0.1 to v0.0.4 included a code execution backdoor inserted by a third party.
0
Attacker Value
Unknown
CVE-2022-2187
Disclosure Date: July 17, 2022 (last updated October 07, 2023)
The Contact Form 7 Captcha WordPress plugin before 0.1.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
0
Attacker Value
Unknown
CVE-2022-24880
Disclosure Date: April 25, 2022 (last updated October 07, 2023)
flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. In versions prior to 1.2.1, he `captcha.validate()` function would return `None` if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Version 1.2.1 fixes the issue. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.
0
Attacker Value
Unknown
CVE-2021-42358
Disclosure Date: November 29, 2021 (last updated February 23, 2025)
The Contact Form With Captcha WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation in the ~/cfwc-form.php file during contact form submission, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.6.2.
0
Attacker Value
Unknown
CVE-2021-24565
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
The Contact Form 7 Captcha WordPress plugin before 0.0.9 does not have any CSRF check in place when saving its settings, allowing attacker to make a logged in user with the manage_options change them. Furthermore, the settings are not escaped when output in attributes, leading to a Stored Cross-Site Scripting issue.
0
Attacker Value
Unknown
CVE-2021-39362
Disclosure Date: August 22, 2021 (last updated February 23, 2025)
An XSS issue was discovered in ReCaptcha Solver 5.7. A response from Anti-Captcha.com, RuCaptcha.com, 2captcha.com, DEATHbyCAPTCHA.com, ImageTyperz.com, or BestCaptchaSolver.com in setCaptchaCode() is inserted into the DOM as HTML, resulting in full control over the user's browser by these servers.
0
Attacker Value
Unknown
CVE-2020-15514
Disclosure Date: July 07, 2020 (last updated February 21, 2025)
The jh_captcha extension through 2.1.3, and 3.x through 3.0.2, for TYPO3 allows XSS.
0
Attacker Value
Unknown
CVE-2018-21012
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
The cf7-invisible-recaptcha plugin before 1.3.2 for WordPress has XSS.
0