Show filters
132 Total Results
Displaying 51-60 of 132
Sort by:
Attacker Value
Unknown

CVE-2022-3477

Disclosure Date: November 14, 2022 (last updated December 22, 2024)
The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address
Attacker Value
Unknown

CVE-2022-41308

Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Attacker Value
Unknown

CVE-2022-41307

Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Attacker Value
Unknown

CVE-2022-41305

Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Attacker Value
Unknown

CVE-2022-41301

Disclosure Date: October 03, 2022 (last updated October 08, 2023)
A maliciously crafted PKT file when consumed through SubassemblyComposer.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Attacker Value
Unknown

CVE-2022-2516

Disclosure Date: September 06, 2022 (last updated October 08, 2023)
The Visual Composer Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post/page 'Title' value in versions up to, and including, 45.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with access to the visual composer editor to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2022-2430

Disclosure Date: September 06, 2022 (last updated October 08, 2023)
The Visual Composer Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Text Block' feature in versions up to, and including, 45.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with access to the visual composer editor to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2022-31216

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product.
Attacker Value
Unknown

CVE-2022-31219

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product.
Attacker Value
Unknown

CVE-2022-31217

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product.