CVE-2023-46072 – WordPress Add Shortcodes Actions And Filters Plugin <= 2.0.9 is vulnerable to Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2023-46072
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Simpson Add Shortcodes Actions And Filters plugin <= 2.0.9 versions. Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada no autenticada en el complemento in Michael Simpson Add Shortcodes Actions And Filters en versiones <= 2.0.9. The Add Shortcodes Actions And Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 2.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/add-actions-and-filters/wordpress-add-shortcodes-actions-and-filters-plugin-2-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-37342 – WordPress Add Shortcodes Actions And Filters plugin <= 2.0.9 - Authenticated Stored Cross-Site Scripting (XSS) vulnerability
https://notcve.org/view.php?id=CVE-2022-37342
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability Add Shortcodes Actions And Filters plugin <= 2.0.9 at WordPress. Una vulnerabilidad de tipo Cross-Site Scripting (XSS) Autenticado (admin+) Almacenado en el plugin Add Shortcodes Actions And Filters versiones anteriores a 2.0.9 incluyéndola en WordPress. The Add Shortcodes Actions And Filters plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://patchstack.com/database/vulnerability/add-actions-and-filters/wordpress-add-shortcodes-actions-and-filters-plugin-2-0-9-authenticated-stored-cross-site-scripting-xss-vulnerability/_s_id=cve https://wordpress.org/plugins/add-actions-and-filters • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-31787
https://notcve.org/view.php?id=CVE-2021-31787
The Bluetooth Classic implementation on Actions ATS2815 chipsets does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown of a device by flooding the target device with LMP_features_res packets. La implementación de Bluetooth Classic en los conjuntos de chips Actions ATS2815 no maneja apropiadamente la recepción de respuestas LMP continuas no solicitadas, que permite a atacantes en el rango de radio desencadenar una denegación de servicio y el apagado de un dispositivo mediante la inundación del dispositivo de destino con paquetes LMP_features_res • https://dl.packetstormsecurity.net/papers/general/braktooth.pdf https://launchstudio.bluetooth.com/ListingDetails/76427 https://www.actions-semi.com/index.php?id=3581&siteId=4 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2021-31786
https://notcve.org/view.php?id=CVE-2021-31786
The Bluetooth Classic Audio implementation on Actions ATS2815 and ATS2819 devices does not properly handle a connection attempt from a host with the same BDAddress as the current connected BT host, allowing attackers to trigger a disconnection and deadlock of the device by connecting with a forged BDAddress that matches the original connected host. Una implementación de Bluetooth Classic Audio en los dispositivos Actions ATS2815 y ATS2819, no maneja apropiadamente un intento de conexión desde un host con la misma dirección BDAddress que el host BT conectado en ese momento, permitiendo a atacantes desencadenar una desconexión y un bloqueo del dispositivo al conectarse con una dirección BDAddress falsificada que coincide con el host conectado original • https://dl.packetstormsecurity.net/papers/general/braktooth.pdf https://launchstudio.bluetooth.com/ListingDetails/76427 https://www.actions-semi.com/index.php?id=3581&siteId=4 • CWE-667: Improper Locking •
CVE-2021-31785
https://notcve.org/view.php?id=CVE-2021-31785
The Bluetooth Classic implementation on Actions ATS2815 and ATS2819 chipsets does not properly handle the reception of multiple LMP_host_connection_req packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device via crafted LMP packets. Manual user intervention is required to restart the device and restore Bluetooth communication. Una implementación de Bluetooth Classic en los conjuntos de chips Actions ATS2815 y ATS2819, no maneja apropiadamente la recepción de múltiples paquetes LMP_host_connection_req, permitiendo a atacantes en el rango de radio desencadenar una denegación de servicio (bloqueo) del dispositivo por medio de paquetes LMP diseñados. Es requerida una intervención manual del usuario para reiniciar el dispositivo y restaurar la comunicación Bluetooth • https://dl.packetstormsecurity.net/papers/general/braktooth.pdf https://launchstudio.bluetooth.com/ListingDetails/76427 https://www.actions-semi.com/index.php?id=3581&siteId=4 • CWE-667: Improper Locking •