Page 400 of 10738 results (0.043 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

The WP Job Openings WordPress plugin before 3.4.3 does not block listing the contents of the directories where it stores attachments to job applications, allowing unauthenticated visitors to list and download private attachments if the autoindex feature of the web server is enabled. El complemento WP Job Openings de WordPress anterior a 3.4.3 no bloquea la lista de contenidos de los directorios donde almacena archivos adjuntos a las solicitudes de empleo, lo que permite a los visitantes no autenticados enumerar y descargar archivos adjuntos privados si la función autoindex del servidor web está habilitada. The WP Job Openings plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.4.2 due to lack of an index file in storage directories. This can allow unauthenticated attackers to extract sensitive data including uploaded resumes and job applications if Directory Listing is enabled on the server. • https://wpscan.com/vulnerability/882f6c36-44c6-4273-81cd-2eaaf5e81fa7 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-552: Files or Directories Accessible to External Parties •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

This issue may lead to information disclosure. • https://github.com/SpeciesFileGroup/taxonworks/commit/a98f2dc610a541678e1e51af47659cd8b30179ae https://github.com/SpeciesFileGroup/taxonworks/security/advisories/GHSA-m9p2-jxr6-4p6c • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. ... Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. • https://www.zerodayinitiative.com/advisories/ZDI-23-1455 • CWE-125: Out-of-bounds Read •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The Easy Registration Forms for WordPress is vulnerable to Information Disclosure via the 'erforms_user_meta' shortcode in versions up to, and including, 2.1.1 due to insufficient controls on the information retrievable via the shortcode. • https://plugins.trac.wordpress.org/browser/easy-registration-forms/tags/2.1.1/includes/class-user.php#L835 https://www.wordfence.com/threat-intel/vulnerabilities/id/562fe11f-36a0-4f23-9eed-50ada7ab2961?source=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 13%CPEs: 4EXPL: 2

Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that can lead to information disclosure via malicious link references in plain/text messages. • https://github.com/s3cb0y/CVE-2023-43770-POC https://github.com/knight0x07/CVE-2023-43770-PoC https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html https://roundcube.net/news/2023/09/15/security-update-1.6.3-released • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •