Show filters
65 Total Results
Displaying 41-50 of 65
Sort by:
Attacker Value
Unknown

CVE-2022-37411

Disclosure Date: September 01, 2022 (last updated October 08, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in Vinoj Cardoza's Captcha Code plugin <= 2.7 at WordPress.
Attacker Value
Unknown

CVE-2022-2184

Disclosure Date: August 01, 2022 (last updated October 08, 2023)
The CAPTCHA 4WP WordPress plugin before 7.1.0 lets user input reach a sensitive require_once call in one of its admin-side templates. This can be abused by attackers, via a Cross-Site Request Forgery attack to run arbitrary code on the server.
Attacker Value
Unknown

CVE-2022-34983

Disclosure Date: July 22, 2022 (last updated October 07, 2023)
The scu-captcha package in PyPI v0.0.1 to v0.0.4 included a code execution backdoor inserted by a third party.
Attacker Value
Unknown

CVE-2022-2187

Disclosure Date: July 17, 2022 (last updated October 07, 2023)
The Contact Form 7 Captcha WordPress plugin before 0.1.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
Attacker Value
Unknown

CVE-2022-24880

Disclosure Date: April 25, 2022 (last updated October 07, 2023)
flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. In versions prior to 1.2.1, he `captcha.validate()` function would return `None` if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Version 1.2.1 fixes the issue. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.
Attacker Value
Unknown

CVE-2021-42358

Disclosure Date: November 29, 2021 (last updated February 23, 2025)
The Contact Form With Captcha WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation in the ~/cfwc-form.php file during contact form submission, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.6.2.
0
Attacker Value
Unknown

CVE-2021-24565

Disclosure Date: August 23, 2021 (last updated February 23, 2025)
The Contact Form 7 Captcha WordPress plugin before 0.0.9 does not have any CSRF check in place when saving its settings, allowing attacker to make a logged in user with the manage_options change them. Furthermore, the settings are not escaped when output in attributes, leading to a Stored Cross-Site Scripting issue.
Attacker Value
Unknown

CVE-2021-39362

Disclosure Date: August 22, 2021 (last updated February 23, 2025)
An XSS issue was discovered in ReCaptcha Solver 5.7. A response from Anti-Captcha.com, RuCaptcha.com, 2captcha.com, DEATHbyCAPTCHA.com, ImageTyperz.com, or BestCaptchaSolver.com in setCaptchaCode() is inserted into the DOM as HTML, resulting in full control over the user's browser by these servers.
Attacker Value
Unknown

CVE-2020-15514

Disclosure Date: July 07, 2020 (last updated February 21, 2025)
The jh_captcha extension through 2.1.3, and 3.x through 3.0.2, for TYPO3 allows XSS.
Attacker Value
Unknown

CVE-2018-21012

Disclosure Date: September 09, 2019 (last updated November 27, 2024)
The cf7-invisible-recaptcha plugin before 1.3.2 for WordPress has XSS.