Page 3 of 21 results (0.002 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to v2.0.1. • https://github.com/unilogies/bumsys/commit/927214bd7c475b31062c56294ff7b23d523a7219 https://huntr.dev/bounties/2847b92b-22c2-4dbc-a9d9-56a7cd12fe5f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 0

The Reviews and Rating – Google My Business plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on several functions in versions up to, and including, 4.14. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify restricted data and perform actions intended only for administrators like clearing cache, resetting reviews, and more. • CWE-862: Missing Authorization •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The WP Google My Business Auto Publish WordPress plugin before 3.4 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack. El complemento WP Google My Business Auto Publish de WordPress anterior a 3.4 no valida ni escapa uno de sus atributos de código corto, lo que podría permitir a los usuarios con un rol tan bajo como colaborador realizar un ataque de cross-site scripting almacenado. The WP Google My Business Auto Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in versions up to, and including, 3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page • https://wpscan.com/vulnerability/c01f9d36-955d-432c-8a09-ea9ee750f1a1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

An insufficient session expiration vulnerability exists in Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27, which allows a remote attacker to reuse, spoof, or steal other user and admin sessions. Se presenta una vulnerabilidad de caducidad de sesión insuficiente en la plataforma TopEase® de Business-DNA Solutions GmbH, versiones anteriores a 7.1.27 incluyéndola, que permite a un atacante remoto reusar, falsificar o robar otras sesiones de usuario y de administrador • https://confluence.topease.ch/confluence/display/DOC/Release+Notes • CWE-613: Insufficient Session Expiration •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The Business Hours Indicator WordPress plugin before 2.3.5 does not sanitise or escape its 'Now closed message" setting when outputting it in the backend and frontend, leading to an Authenticated Stored Cross-Site Scripting issue El plugin Business Hours Indicator de WordPress versiones anteriores a 2.3.5, no sanea ni escapa de su configuración "Now closed message" cuando lo muestra en el backend y en el frontend, conllevando a un problema de tipo Cross-Site Scripting almacenado y autenticado. • https://wpscan.com/vulnerability/309296d4-c397-4fc7-85fb-a28b5b5b6a8d • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •