Show filters
104 Total Results
Displaying 51-60 of 104
Sort by:
Attacker Value
Unknown
CVE-2023-29457
Disclosure Date: July 13, 2023 (last updated October 08, 2023)
Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.
0
Attacker Value
Unknown
CVE-2023-29456
Disclosure Date: July 13, 2023 (last updated February 14, 2025)
URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.
0
Attacker Value
Unknown
CVE-2023-29455
Disclosure Date: July 13, 2023 (last updated October 08, 2023)
Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.
0
Attacker Value
Unknown
CVE-2023-29454
Disclosure Date: July 13, 2023 (last updated February 14, 2025)
Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
0
Attacker Value
Unknown
CVE-2023-30963
Disclosure Date: July 10, 2023 (last updated October 08, 2023)
A security defect was discovered in Foundry Frontend which enabled users to perform Stored XSS attacks in Slate if Foundry's CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.229.0. The service was rolled out to all affected Foundry instances. No further intervention is required.
0
Attacker Value
Unknown
CVE-2023-22835
Disclosure Date: July 10, 2023 (last updated October 08, 2023)
A security defect was identified that enabled a user of Foundry Issues to perform a Denial of Service attack by submitting malformed data in an Issue that caused loss of frontend functionality to all issue participants.
This defect was resolved with the release of Foundry Issues 2.510.0 and Foundry Frontend 6.228.0.
0
Attacker Value
Unknown
CVE-2021-4383
Disclosure Date: June 07, 2023 (last updated October 08, 2023)
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to page content injection in versions up to, and including, 5.5. This is due to missing capability checks in the plugin's page-editing functionality. This makes it possible for low-authenticated attackers, such as subscribers, to edit/create any page or post on the blog.
0
Attacker Value
Unknown
CVE-2021-4378
Disclosure Date: June 07, 2023 (last updated October 08, 2023)
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with minimal permissions like subscribers, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2021-4371
Disclosure Date: June 07, 2023 (last updated October 08, 2023)
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Setting Changs in versions up to, and including, 5.5. This is due to lacking both a security nonce and a capabilities check. This makes it possible for low-authenticated attackers to change plugin settings even when they do not have the capabilities to do so.
0
Attacker Value
Unknown
CVE-2021-4369
Disclosure Date: June 07, 2023 (last updated October 08, 2023)
The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated Content Injection in versions up to, and including, 18.2. This is due to lacking authorization protections, checks against users editing other's posts, and lacking a security nonce, all on the wpfm_edit_file_title_desc AJAX action. This makes it possible for unauthenticated attackers to edit the content and title of every page on the site.
0