4 results (0.009 seconds)

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Pay is a payments engine for Ruby on Rails 6.0 and higher. In versions prior to 6.3.2 a payments info page of Pay is susceptible to reflected Cross-site scripting. An attacker could create a working URL that renders a javascript link to a user on a Rails application that integrates Pay. This URL could be distributed via email to specifically target certain individuals. If the targeted application contains a functionality to submit user-generated content (such as comments) the attacker could even distribute the URL using that functionality. • https://github.com/pay-rails/pay/commit/5d6283a24062bd272a524ec48415f536a67ad57f https://github.com/pay-rails/pay/security/advisories/GHSA-cqf3-vpx7-rxhw • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The post-pay-counter plugin before 2.731 for WordPress has no permissions check for an update-settinga action. El complemento post-pay-counter en versiones anteriores a 2.731 para WordPress no tiene verificación de permisos para una acción de configuración de actualización. The Post Pay Counter plugin before 2.731 for WordPress has no permissions check for an update-settings action. • https://wordpress.org/plugins/post-pay-counter/#developers • CWE-264: Permissions, Privileges, and Access Controls CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The post-pay-counter plugin before 2.731 for WordPress has PHP Object Injection. El plugin post-pay-counter en versiones anteriores a 2.731 para WordPress tiene inyección de objetos PHP. The Post Pay Counter plugin before 2.731 for WordPress has PHP Object Injection via deserialization of untrusted input via the 'import_settings_content' parameter. • https://wordpress.org/plugins/post-pay-counter/#developers • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-502: Deserialization of Untrusted Data •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in payper/payper.php in the Pay Per Media Player plugin 1.24 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) fcolor, (2) links, (3) stitle, (4) height, (5) width, (6) host, (7) bcolor, (8) msg, (9) id, or (10) size parameter. Múltiples vulnerabilidades de XSS en payper/payper.php en el plugin Pay Per Media Player 1.24 y anteriores para WordPress permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro (1) fcolor, (2) links, (3) stitle, (4) height, (5) width, (6) host, (7) bcolor, (8) msg, (9) id, o (10) size. • http://codevigilant.com/disclosure/wp-plugin-pay-per-media-player-a3-cross-site-scripting-xss http://www.securityfocus.com/bid/68447 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •