Page 7 of 34 results (0.022 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

The wp-live-chat-support plugin before 4.1.0 for WordPress has JavaScript injections. El plugin wp-live-chat-support antes de 4.1.0 para WordPress tiene inyecciones de JavaScript. • https://wordpress.org/plugins/wp-live-chat-support/#developers • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

3CX Phone System 6.0.806.0 allows remote attackers to cause a denial of service (unstable service or crash) via unspecified vectors, as demonstrated by vulnerability scans from Nessus or SAINT. 3CX Phone System v6.0.806.0, permite a atacantes remotos provocar una denegación de servicio (servicio inestable o caída) a través de vectores no especificados, como se ha demostrado con el escaneo de la vulnerabilidad con NEssus o SAINT. • http://marc.info/?l=full-disclosure&m=122868146707468&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/52450 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

login.php in 3CX Phone System 6.0.806.0, when 100% disk capacity is reached, allows remote attackers to gain sensitive information via unspecified vectors that reveal the installation path. login.php en 3CX Phone System v6.0.806.0, cuando se alcanza el 100% de la capacidad del disco, permite a atacantes remotos obtener información sensible a través de vectores desconocidos que muestran la ruta de instalación. • http://marc.info/?l=full-disclosure&m=122868146707468&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/52452 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in login.php in 3CX Phone System Free Edition 6.1793 and 6.0.806.0 allow remote attackers to inject arbitrary web script or HTML via the (1) fName and (2) fPassword parameters. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en login.php en 3CX Phone System Free Edition v6.1793 y v6.0.806.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante los parámetros (1) "fName" y (2) "fPassword". • http://marc.info/?l=full-disclosure&m=122868146707468&w=2 http://osvdb.org/50599 http://secunia.com/advisories/33060 http://www.securityfocus.com/bid/32709 https://exchange.xforce.ibmcloud.com/vulnerabilities/47167 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •