2 results (0.007 seconds)

CVSS: 6.1EPSS: 6%CPEs: 1EXPL: 1

10 Sep 2019 — An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code. Se detectó un problema de tipo XSS en el plugin checklist versiones anteriores a 1.1.9 para WordPress. El parámetro fill no es filtrado correctamente en el archivo checklist-icon.php, y es posible inyectar código JavaScript. • https://packetstormsecurity.com/files/154436/WordPress-Checklist-1.1.5-Cross-Site-Scripting.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 25%CPEs: 4EXPL: 3

22 Feb 2018 — SQL Injection exists in the CheckList 1.1.1 component for Joomla! via the title_search, tag_search, name_search, description_search, or filter_order parameter. Existe inyección SQL en el componente CheckList 1.1.1 para Joomla! mediante los parámetros title_search, tag_search, name_search, description_search o filter_order. Joomla! • https://packetstorm.news/files/id/146550 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •