Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown

CVE-2023-25711

Disclosure Date: April 07, 2023 (last updated November 08, 2023)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPGlobus WPGlobus Translate Options plugin <= 2.1.0 versions.
Attacker Value
Unknown

CVE-2018-5367

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[post_type][post] parameter to wp-admin/options.php.
0
Attacker Value
Unknown

CVE-2018-5364

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[browser_redirect][redirect_by_language] parameter to wp-admin/options.php.
0
Attacker Value
Unknown

CVE-2018-5363

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[enabled_languages][en] or wpglobus_option[enabled_languages][fr] (or any other language) parameter to wp-admin/options.php.
0
Attacker Value
Unknown

CVE-2018-5366

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[more_languages] parameter to wp-admin/options.php.
0
Attacker Value
Unknown

CVE-2018-5365

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[selector_wp_list_pages][show_selector] parameter to wp-admin/options.php.
0
Attacker Value
Unknown

CVE-2018-5361

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
The WPGlobus plugin 1.9.6 for WordPress has CSRF via wp-admin/options.php.
0
Attacker Value
Unknown

CVE-2018-5362

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[post_type][page] parameter to wp-admin/options.php.
0
Attacker Value
Unknown

CVE-2012-3292

Disclosure Date: June 07, 2012 (last updated October 04, 2023)
The GridFTP in Globus Toolkit (GT) before 5.2.2, when certain autoconf macros are defined, does not properly check the return value from the getpwnam_r function, which might allow remote attackers to gain privileges by logging in with a user that does not exist, which causes GridFTP to run as the last user in the password file.
0
Attacker Value
Unknown

CVE-2011-0738

Disclosure Date: February 02, 2011 (last updated October 04, 2023)
MyProxy 5.0 through 5.2, as used in Globus Toolkit 5.0.0 through 5.0.2, does not properly verify the (1) hostname or (2) identity in the X.509 certificate for the myproxy-server, which allows remote attackers to spoof the server and conduct man-in-the-middle (MITM) attacks via a crafted certificate when executing (a) myproxy-logon or (b) myproxy-get-delegation.
0