4 results (0.007 seconds)

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

24 Jan 2025 — Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yannick Lefebvre Bug Library allows Blind SQL Injection. This issue affects Bug Library: from n/a through 2.1.4. The Bug Library plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 2.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributo... • https://patchstack.com/database/wordpress/plugin/bug-library/vulnerability/wordpress-bug-library-plugin-2-1-4-sql-injection-vulnerability?_s_id=cve • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1

28 Jun 2024 — The Bug Library WordPress plugin before 2.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) El complemento Bug Library de WordPress anterior a 2.1.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site ... • https://wpscan.com/vulnerability/29985150-8d49-4a3f-8411-5d7263b424d8 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

22 Jun 2024 — The Bug Library WordPress plugin before 2.1.1 does not check the file type on user-submitted bug reports, allowing an unauthenticated user to upload PHP files El complemento Bug Library de WordPress anterior a 2.1.1 no verifica el tipo de archivo en los informes de errores enviados por los usuarios, lo que permite a un usuario no autenticado cargar archivos PHP. The Bug Library plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the add_bug_field function in a... • https://wpscan.com/vulnerability/d91217bc-9f8f-4971-885e-89edc45b2a4d • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

09 Sep 2021 — The Bug Library WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the successimportcount parameter found in the ~/bug-library.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.3. El plugin Bug Library de WordPress, es vulnerable a un ataque de tipo Cross-Site Scripting Reflejado por medio del parámetro successimportcount encontrado en el archivo ~/bug-library.php que permite a atacantes inyectar scripts web arbitrario, en versiones hasta ... • https://plugins.trac.wordpress.org/browser/bug-library/trunk/bug-library.php?rev=2571533#L1358 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •