6 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

The Popup by Supsystic WordPress plugin before 1.10.19 has a prototype pollution vulnerability that could allow an attacker to inject arbitrary properties into Object.prototype. The plugin Popup by Supsystic for WordPress is vulnerable to prototype pollution, which could make injecting malicious web scripts possible in some cases. • https://wpscan.com/vulnerability/545007fc-3173-47b1-82c4-ed3fd1247b9c • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The ZYREX POPUP WordPress plugin through 1.0 does not validate the type of files uploaded when creating a popup, allowing a high privileged user (such as an Administrator) to upload arbitrary files, even when modifying the file system is disallowed, such as in a multisite install. The Zyrex Popup plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the zx_main_page function in versions up to, and including, 1.0. This makes it possible for authenticated attackers, with administrative privileges, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://wpscan.com/vulnerability/0fd0d7a5-9263-43b6-9244-7880c3d3e6f4 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in Supsystic Popup Plugin 1.7.6 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • http://seclists.org/fulldisclosure/2017/Feb/97 https://map.httpcs.com/alert/284665 https://vuldb.com/?id.97385 https://www.exploit-db.com/exploits/41485 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.3EPSS: 1%CPEs: 1EXPL: 1

The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users El plugin Popup by Supsystic de WordPress versiones hasta 1.10.9, no dispone de autenticación y autorización en una acción AJAX, permitiendo a atacantes no autenticados llamarlo y obtener las direcciones de correo electrónico de los usuarios suscritos • https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-306: Missing Authentication for Critical Function •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 3

The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue El plugin Popup de Supsystic WordPress versiones anteriores a 1.10.5, no saneaba el parámetro tab de su página options antes de mostrarlo en un atributo, conllevando a un problema de tipo Cross-Site Scripting reflejado WordPress Popup plugin version 1.10.4 suffers from a cross site scripting vulnerability. • https://www.exploit-db.com/exploits/50346 http://packetstormsecurity.com/files/164311/WordPress-Popup-1.10.4-Cross-Site-Scripting.html https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •