Page 5 of 72 results (0.005 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

The Rating by BestWebSoft WordPress plugin before 1.6 does not validate the submitted rating, allowing submission of long integer, causing a Denial of Service on the post/page when a user submit such rating El plugin Rating by BestWebSoft WordPress anterior a la versión 1.6 no valida la valoración enviada, permitiendo el envío de enteros largos, lo que provoca una denegación de servicio en la entrada/página cuando un usuario envía dicha valoración The Rating by BestWebSoft WordPress plugin through 1.5 does not validate the submitted rating, allowing submission of long integer, causing a Denial of Service on the post/page when a user submit such rating • https://wpscan.com/vulnerability/efb1ddef-2123-416c-a932-856d41ed836d • CWE-191: Integer Underflow (Wrap or Wraparound) CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The Error Log Viewer WordPress plugin before 1.1.2 does not perform nonce check when deleting a log file and does not have path traversal prevention, which could allow attackers to make a logged in admin delete arbitrary text files on the web server. El plugin de WordPress Error Log Viewer anterior a la versión 1.1.2 no realiza la comprobación de nonce al eliminar un archivo de registro y no tiene prevención de path traversal, lo que podría permitir a los atacantes hacer que un administrador conectado elimine archivos de texto arbitrarios en el servidor web The Error Log Viewer WordPress plugin through 1.1.1 does not perform nonce check when deleting a log file and does not have path traversal prevention, which could allow attackers to make a logged in admin delete arbitrary text files on the web server. • https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder El plugin Error Log Viewer de WordPress versiones hasta 1.1.1, no comprueba la ruta del archivo de registro que va a ser borrada, permitiendo a usuarios con altos privilegios borrar archivos arbitrarios en el servidor web, incluidos los que están fuera de la carpeta del blog WordPress Error Log Viewer plugin version 1.1.1 suffers from an arbitrary file deletion vulnerability where it can be leveraged to wipe the internal contents of any named file the webserver has permissions to modify. • https://www.exploit-db.com/exploits/50746 https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0 • CWE-73: External Control of File Name or Path •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The Visitors WordPress plugin through 0.3 is affected by an Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability. The plugin would display the user's user agent string without validation or encoding within the WordPress admin panel. El plugin Visitors WordPress versiones hasta 0.3, está afectado por una vulnerabilidad de tipo Cross-Site Scripting (XSS) almacenado sin autenticación. El plugin mostraría la cadena de agente de usuario del usuario sin comprobación o codificación dentro del panel de administración de WordPress • https://wpscan.com/vulnerability/06f1889d-8e2f-481a-b91b-3a8008e00ffc • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The BestWebSoft Htaccess plugin through 1.8.1 for WordPress allows wp-admin/admin.php?page=htaccess.php&action=htaccess_editor CSRF. The flag htccss_nonce_name passes the nonce to WordPress but the plugin does not validate it correctly, resulting in a wrong implementation of anti-CSRF protection. In this way, an attacker is able to direct the victim to a malicious web page that modifies the .htaccess file, and takes control of the website. El plugin BestWebSoft Htaccess versiones hasta 1.8.1 para WordPress, permite un ataque de tipo CSRF de wp-admin/admin.php? • https://github.com/V1n1v131r4/Exploiting-WP-Htaccess-by-BestWebSoft-Plugin/blob/master/README.md https://wordpress.org/plugins/htaccess/#developers https://wpvulndb.com/vulnerabilities/10060 • CWE-352: Cross-Site Request Forgery (CSRF) •