6 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Super Store Finder 3.7 and below is vulnerable to authenticated Arbitrary PHP Code Injection that could lead to Remote Code Execution when settings overwrite config.inc.php content. Super Store Finder 3.7 y versiones anteriores son vulnerables a la inyección de código PHP arbitrario autenticado que podría provocar la ejecución remota de código cuando la configuración sobrescribe el contenido de config.inc.php. • https://packetstormsecurity.com/files/174756/Super-Store-Finder-3.7-Remote-Command-Execution.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Super Store Finder v3.6 and below was discovered to contain a SQL injection vulnerability via the Search parameter at /admin/stores.php. Se descubrió que Super Store Finder v3.6 y versiones anteriores contenían una vulnerabilidad de inyección SQL a través del parámetro de búsqueda en /admin/stores.php. • https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.3. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer. El complemento Super Store Finder para WordPress es vulnerable a la creación y retransmisión de correo electrónico arbitrario no autenticado en versiones hasta la 6.9.3 incluida. • https://superstorefinder.net https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=cve • CWE-862: Missing Authorization •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters. Se descubrió que Super Store Finder v3.6 contiene múltiples vulnerabilidades de inyección SQL en el componente "store locator" a través de los parámetros "products", "distance", "lat" y "lng". • https://github.com/redblueteam/CVE-2023-41507 https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel. Una contraseña incrustada en Super Store Finder v3.6 permite a los atacantes acceder al panel de administración. • https://github.com/redblueteam/CVE-2023-41508 https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes • CWE-798: Use of Hard-coded Credentials •