Show filters
56 Total Results
Displaying 51-56 of 56
Sort by:
Attacker Value
Unknown
CVE-2022-4063
Disclosure Date: December 19, 2022 (last updated October 08, 2023)
The InPost Gallery WordPress plugin before 2.1.4.1 insecurely uses PHP's extract() function when rendering HTML views, allowing attackers to force the inclusion of malicious files & URLs, which may enable them to run code on servers.
0
Attacker Value
Unknown
CVE-2022-1916
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
The Active Products Tables for WooCommerce. Professional products tables for WooCommerce store WordPress plugin before 1.0.5 does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected cross-Site Scripting
0
Attacker Value
Unknown
CVE-2022-0234
Disclosure Date: February 21, 2022 (last updated February 23, 2025)
The WOOCS WordPress plugin before 1.3.7.5 does not sanitise and escape the woocs_in_order_currency parameter of the woocs_get_products_price_html AJAX action (available to both unauthenticated and authenticated users) before outputting it back in the response, leading to a Reflected Cross-Site Scripting
0
Attacker Value
Unknown
CVE-2021-25085
Disclosure Date: February 01, 2022 (last updated February 23, 2025)
The WOOF WordPress plugin before 1.2.6.3 does not sanitise and escape the woof_redraw_elements before outputing back in an admin page, leading to a Reflected Cross-Site Scripting
0
Attacker Value
Unknown
CVE-2021-25043
Disclosure Date: January 10, 2022 (last updated February 23, 2025)
The WOOCS WordPress plugin before 1.3.7.3 does not sanitise and escape the custom_prices parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue
0
Attacker Value
Unknown
CVE-2021-20781
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Cross-site request forgery (CSRF) vulnerability in WordPress Meta Data Filter & Taxonomies Filter versions prior to v.1.2.8 and versions prior to v.2.2.8 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
0