Show filters
472 Total Results
Displaying 51-60 of 472
Sort by:
Attacker Value
Unknown

CVE-2013-10021

Disclosure Date: March 11, 2023 (last updated October 20, 2023)
A vulnerability was found in dd32 Debug Bar Plugin up to 0.8 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function render of the file panels/class-debug-bar-queries.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.8.1 is able to address this issue. The patch is named 0842af8f8a556bc3e39b9ef758173b0a8a9ccbfc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222739.
Attacker Value
Unknown

CVE-2022-4392

Disclosure Date: January 09, 2023 (last updated October 08, 2023)
The iPanorama 360 WordPress Virtual Tour Builder plugin through 1.6.29 does not sanitise and escape some of its settings, which could allow users such as contributor+ to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Attacker Value
Unknown

CVE-2023-22622

Disclosure Date: January 05, 2023 (last updated October 08, 2023)
WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.
Attacker Value
Unknown

CVE-2022-4142

Disclosure Date: January 02, 2023 (last updated October 08, 2023)
The WordPress Filter Gallery Plugin WordPress plugin before 0.1.6 does not properly escape the filters passed in the ufg_gallery_filters ajax action before outputting them on the page, allowing a high privileged user such as an administrator to inject HTML or javascript to the plugin settings page, even when the unfiltered_html capability is disabled.
Attacker Value
Unknown

CVE-2022-3590

Disclosure Date: December 14, 2022 (last updated October 08, 2023)
WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.
Attacker Value
Unknown

CVE-2022-43468

Disclosure Date: December 07, 2022 (last updated October 08, 2023)
External initialization of trusted variables or data stores vulnerability exists in WordPress Popular Posts 6.0.5 and earlier, therefore the vulnerable product accepts untrusted external inputs to update certain internal variables. As a result, the number of views for an article may be manipulated through a crafted input.
Attacker Value
Unknown

CVE-2022-43504

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
Improper authentication vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to obtain the email address of the user who posted a blog using the WordPress Post by Email Feature. The developer also provides new patched releases for all versions since 3.7.
Attacker Value
Unknown

CVE-2022-43500

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script. The developer also provides new patched releases for all versions since 3.7.
Attacker Value
Unknown

CVE-2022-43497

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script. The developer also provides new patched releases for all versions since 3.7.
Attacker Value
Unknown

CVE-2022-1591

Disclosure Date: September 19, 2022 (last updated October 08, 2023)
The WordPress Ping Optimizer WordPress plugin before 2.35.1.3.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack