26 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The Calendar plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcodes in all versions up to, and including, 1.3.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. El complemento Calendar para WordPress es vulnerable a la inyección SQL a través de los códigos cortos del complemento en todas las versiones hasta la 1.3.14 incluida debido a un escape insuficiente en el parámetro proporcionado por el usuario y a la falta de preparación suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer información confidencial de la base de datos. • https://wordpress.org/plugins/calendar https://www.wordfence.com/threat-intel/vulnerabilities/id/0886fa16-4292-4223-af01-9aa1f36490f7?source=cve • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Nextcloud/Cloud is a calendar app for Nextcloud. An attacker can gain access to stacktrace and internal paths of the server when generating an exception while editing a calendar appointment. It is recommended that the Nextcloud Calendar app is upgraded to 4.5.3 Nextcloud/Cloud es una aplicación de calendario para Nextcloud. Un atacante puede obtener acceso al seguimiento de pila y a las rutas internas del servidor al generar una excepción al editar una cita del calendario. Se recomienda actualizar la aplicación Calendario Nextcloud a 4.5.3 • https://github.com/nextcloud/calendar/pull/5553 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fv3c-qvjr-5rv8 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer CWE-1258: Exposure of Sensitive System Information Due to Uncleared Debug Information •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app. Nextcloud calendar es una aplicación de calendario para la plataforma del servidor Nextcloud. • https://github.com/nextcloud/calendar/pull/5358 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452 https://hackerone.com/reports/2058337 • CWE-354: Improper Validation of Integrity Check Value CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

Potential zip path traversal vulnerability in Calendar application prior to version 12.4.07.15 in Android 13 allows attackers to write arbitrary file. • https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=07 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Calendar app for Nextcloud easily sync events from various devices with your Nextcloud. Some internal paths of the website are disclosed when the SMTP server is unavailable. It is recommended that the Calendar app is updated to 3.5.5 or 4.2.3 • https://github.com/nextcloud/calendar/pull/4938 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2792-2734-hr7j • CWE-285: Improper Authorization •