Show filters
132 Total Results
Displaying 51-60 of 132
Sort by:
Attacker Value
Unknown
CVE-2022-3477
Disclosure Date: November 14, 2022 (last updated December 22, 2024)
The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address
0
Attacker Value
Unknown
CVE-2022-41308
Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
0
Attacker Value
Unknown
CVE-2022-41307
Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
0
Attacker Value
Unknown
CVE-2022-41305
Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
0
Attacker Value
Unknown
CVE-2022-41301
Disclosure Date: October 03, 2022 (last updated October 08, 2023)
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
0
Attacker Value
Unknown
CVE-2022-2516
Disclosure Date: September 06, 2022 (last updated October 08, 2023)
The Visual Composer Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post/page 'Title' value in versions up to, and including, 45.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with access to the visual composer editor to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2022-2430
Disclosure Date: September 06, 2022 (last updated October 08, 2023)
The Visual Composer Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Text Block' feature in versions up to, and including, 45.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with access to the visual composer editor to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2022-31216
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product.
0
Attacker Value
Unknown
CVE-2022-31219
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product.
0
Attacker Value
Unknown
CVE-2022-31217
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product.
0