4 results (0.008 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

The Oxygen Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a custom field in all versions up to, and including, 4.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: Version 4.8.1 of the Oxygen Builder plugin for WordPress addresses this vulnerability by implementing an optional filter to provide output escaping for dynamic data. Please see https://oxygenbuilder.com/documentation/other/security/#filtering-dynamic-data for more details. El complemento Oxygen Builder para WordPress es vulnerable a Cross-Site Scripting almacenado a través de un campo personalizado en todas las versiones hasta la 4.8 inclusive debido a una sanitización de entrada y un escape de salida insuficientes. • https://oxygenbuilder.com/oxygen-4-8-1-now-available https://www.wordfence.com/threat-intel/vulnerabilities/id/ee069cb3-370e-48ea-aa35-c30fe83c2498?source=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in Soflyy Oxygen Builder plugin <= 4.4 versions. Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Soflyy Oxygen Builder en versiones &lt;=&#xa0;4.4. The Oxygen plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to 4.4. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to perform unauthorized actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/oxygen/wordpress-oxygen-builder-plugin-4-6-2-cross-site-request-forgery-csrf?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

SQL injection vulnerability in viewthread.php in Oxygen (O2PHP Bulletin Board) 1.1.3 and earlier allows remote attackers to execute arbitrary SQL commands via the pid parameter, a different vector than CVE-2006-1572. Vulnerabilidad de inyección SQL en viewthread.php de Oxygen (O2PHP Bulletin Board) 1.1.3 y anteriores permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro pid, un vector distinto de CVE-2006-1572. • https://www.exploit-db.com/exploits/2810 http://acid-root.new.fr/poc/14061118.txt http://securityreason.com/securityalert/1958 http://www.securityfocus.com/archive/1/452009/100/200/threaded http://www.securityfocus.com/bid/21172 https://exchange.xforce.ibmcloud.com/vulnerabilities/30388 •

CVSS: 5.0EPSS: 2%CPEs: 5EXPL: 1

SQL injection vulnerability in post.php in Oxygen 1.1.3 allows remote attackers to execute arbitrary SQL commands via the fid parameter in a newthread action. • https://www.exploit-db.com/exploits/27535 http://secunia.com/advisories/19481 http://securityreason.com/securityalert/658 http://www.osvdb.org/24287 http://www.securityfocus.com/archive/1/429474/100/0/threaded http://www.securityfocus.com/bid/17324 http://www.vupen.com/english/advisories/2006/1181 https://exchange.xforce.ibmcloud.com/vulnerabilities/25570 •