Page 3 of 16 results (0.011 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

The nex-forms-express-wp-form-builder plugin before 4.6.1 for WordPress has SQL injection via the wp-admin/admin.php?page=nex-forms-main nex_forms_Id parameter. El plugin nex-forms-express-wp-form-builder versiones anteriores a 4.6.1 para WordPress, presenta una inyección SQL por medio del parámetro nex_forms_Id de wp-admin/admin.php?page=nex-forms-main. • http://cinu.pl/research/wp-plugins/mail_cb24b6204803e8e94943b198edc37af7.html https://wordpress.org/plugins/nex-forms-express-wp-form-builder/#developers https://wpvulndb.com/vulnerabilities/8336 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 55%CPEs: 1EXPL: 3

Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary. Aviary Image Editor Add-on para Forms Gravity plugin 3.0 beta para WordPress presenta una vulnerabilidad de carga de archivos sin restricciones en includes/upload.php que permite a atacantes remotos ejecutar código arbitrario al subir un archivo con una extensión ejecutable y acceder a ella a través de una solicitud directa al archivo en wp-content/uploads/gform_aviary. WordPress Aviary Image Editor Add On For Gravity Forms plugin version 3.0 beta suffers from a remote shell upload vulnerability. • https://www.exploit-db.com/exploits/37275 http://packetstormsecurity.com/files/132256/WordPress-Aviary-Image-Editor-Add-On-For-Gravity-Forms-3.0-Beta-Shell-Upload.html http://www.vapid.dhs.org/advisory.php?v=125 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in the NEX-Forms Lite plugin 2.1.0 for WordPress allow remote attackers to inject arbitrary web script or HTML via the form_fields parameter in a (1) do_edit or (2) do_insert action to wp-admin/admin-ajax.php. Múltiples vulnerabilidades de XSS en el plugin NEX-Forms Lite 2.1.0 para WordPress permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro form_field en una acción (1) do_edit o (2) do_insert en wp-admin/admin-ajax.php. Multiple cross-site scripting (XSS) vulnerabilities in the x-forms-express plugin 2.1.0 for WordPress allow remote attackers to inject arbitrary web script or HTML via the form_fields parameter in a (1) do_edit or (2) do_insert action to wp-admin/admin-ajax.php. • https://research.g0blin.co.uk/cve-2014-7151 https://wpvulndb.com/vulnerabilities/8237 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 66%CPEs: 18EXPL: 4

The Infusionsoft Gravity Forms plugin 1.5.3 through 1.5.10 for WordPress does not properly restrict access, which allows remote attackers to upload arbitrary files and execute arbitrary PHP code via a request to utilities/code_generator.php. El plugin Infusionsoft Gravity Forms 1.5.3 hasta 1.5.10 para WordPress no restringe debidamente el acceso, lo que permite a atacantes remotos subir ficheros arbitrarios y ejecutar código PHP arbitrario a través de una solicitud en utilities/code_generator.php. • https://www.exploit-db.com/exploits/34925 http://osvdb.org/show/osvdb/112171 http://packetstormsecurity.com/files/131002/Wordpress-InfusionSoft-Shell-Upload.html http://research.g0blin.co.uk/cve-2014-6446 http://www.exploit-db.com/exploits/34925 https://wordpress.org/plugins/infusionsoft/changelog • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 1

Unrestricted file upload vulnerability in the Gravity Upload Ajax plugin 1.1 and earlier for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file under wp-content/uploads/gravity_forms. Una vulnerabilidad de subida de archivos sin restricción en el plugin Gravity Upload Ajax 1.1 y anteriores para WordPress permite que los atacantes remotos ejecuten código arbitrario mediante la subida de un archivo con una extensión ejecutable y, a continuación, accedan a éste por medio de una petición directa al archivo en wp-content/uploads/gravity_forms. • https://g0blin.co.uk/cve-2014-4972 https://wpvulndb.com/vulnerabilities/8232 • CWE-434: Unrestricted Upload of File with Dangerous Type •