Page 3 of 13 results (0.009 seconds)

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

The Comments – wpDiscuz WordPress plugin through 7.3.0 does not properly sanitise or escape the Follow and Unfollow messages before outputting them in the page, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. El plugin Comments - wpDiscuz de WordPress versiones hasta 7.3.0, no sanea o escapa adecuadamente de los mensajes Follow y Unfollow antes de mostrarlos en la página, que podría permitir a usuarios con altos privilegios llevar a cabo ataques de tipo Cross-Site Scripting Almacenados incluso cuando la capacidad unfiltered_html está deshabilitada The Comments - wpDiscuz WordPress plugin through 7.3.0 does not properly sanitize or escape the Follow and Unfollow messages before outputting them in the page, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. • https://wpscan.com/vulnerability/f51a350c-c46d-4d52-b787-762283625d0b • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 97%CPEs: 1EXPL: 9

A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action. Se presenta una vulnerabilidad de ejecución de código remota en el plugin gVectors wpDiscuz versiones 7.0 hasta 7.0.4 para WordPress, que permite a usuarios no autenticados cargar cualquier tipo de archivo, incluyendo archivos PHP por medio de la acción wmuUploadFiles AJAX. • https://www.exploit-db.com/exploits/49962 https://www.exploit-db.com/exploits/49967 https://github.com/hev0x/CVE-2020-24186-wpDiscuz-7.0.4-RCE https://github.com/Sakura-501/CVE-2020-24186-exploit https://github.com/meicookies/CVE-2020-24186 http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.) Un problema de inyección SQL en el plugin gVectors wpDiscuz versiones 5.3.5 y anteriores para WordPress, permite a los atacantes remotos ejecutan comandos SQL arbitrarios por medio del parámetro order de una petición de wpdLoadMoreComments. (versiones 7.x no están afectadas) • https://github.com/asterite3/CVE-2020-13640 http://www.openwall.com/lists/oss-security/2020/07/06/1 https://plugins.trac.wordpress.org/browser/wpdiscuz/tags/5.3.6 https://plugins.trac.wordpress.org/changeset/2323200 https://wordpress.org/plugins/wpdiscuz/#developers https://wpdiscuz.com/community/news/security-vulnerability-issue-in-5-3-5-please-udate • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •