5 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

14 Mar 2023 — Cross-Site Request Forgery (CSRF) vulnerability in chronoengine.Com Chronoforms plugin <= 7.0.9 versions. The Chronoforms plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 7.0.9. This is due to missing or incorrect nonce validation on several functions in the plugin. This makes it possible for unauthenticated attackers to perform a wide variety of actions such as creating a new form via a forged request granted they can trick a site administrator into perform... • https://patchstack.com/database/vulnerability/chronoforms/wordpress-chronoforms-plugin-7-0-9-cross-site-request-forgery-csrf?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

12 Jan 2022 — ChronoForms 7.0.7 allows fname Directory Traversal to read arbitrary files. ChronoForms versión 7.0.7, permite un Salto de Ruta de fname para leer archivos arbitrarios • https://herolab.usd.de/en/security-advisories/usd-2021-0006 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

12 Jan 2022 — ChronoForums 2.0.11 allows av Directory Traversal to read arbitrary files. ChronoForums versión 2.0.11, permite un Salto de Ruta de av para leer archivos arbitrarios • https://herolab.usd.de/en/security-advisories/usd-2021-0007 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

16 Nov 2020 — Chronoforeum 2.0.11 allows Stored XSS vulnerabilities when inserting a crafted payload into a post. If any user sees the post, the inserted XSS code is executed. Chronoforeum versión 2.0.11, permite vulnerabilidades de tipo XSS almacenado cuando se inserta una carga útil diseñada en una publicación.&#xa0;Si cualquier usuario visualiza el mensaje, es ejecutado el código XSS insertado • https://github.com/nugmubs/chronoforums-cve/wiki/Stored-XSS-Vulnerability-in-Chronoforum-v2.0.11-%28Joomla-plugin%29 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

05 Feb 2008 — Multiple PHP remote file inclusion vulnerabilities in ChronoEngine ChronoForms (com_chronocontact) 2.3.5 component for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) PPS/File.php, (2) Writer.php, and (3) PPS.php in excelwriter/; and (4) BIFFwriter.php, (5) Workbook.php, (6) Worksheet.php, and (7) Format.php in excelwriter/Writer/. Múltiples vulnerabilidades de inclusión de archivos PHP remotos en la componente ChronoEngine ChronoForms (... • https://www.exploit-db.com/exploits/5020 • CWE-94: Improper Control of Generation of Code ('Code Injection') •