3 results (0.033 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to (a) warning.php, (b) notice.php, and (c) inset.php in view/sniplets/, and possibly (d) modules/execute.php; the (2) url parameter to (e) view/admin/submenu.php; and the (3) page parameter to (f) view/admin/pager.php. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en el plugin Sniplets 1.1.2 y 1.2.2 para WordPress, permiten a atacantes remotos inyectar secuencias de comandos web o HTML a través de (1) parametro text en (a) warning.php, (b) notice.php y (c) inset.php en view/sniplets/ y posiblemente (d) modules/execute.php; el (2) parámetro url de (e) view/admin/submenu.phpy el (3) parámetro page en (f) view/admin/pager.php. • https://www.exploit-db.com/exploits/5194 http://secunia.com/advisories/29099 http://securityreason.com/securityalert/3706 http://www.securityfocus.com/archive/1/488734/100/0/threaded http://www.securityfocus.com/bid/27985 https://exchange.xforce.ibmcloud.com/vulnerabilities/40830 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 2

Eval injection vulnerability in modules/execute.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via the text parameter. Vulnerabilidad de inyección Eval en modules/execute.php de Sniplets 1.1.2 y 1.2.2 plugin de WordPress, permite a atacantes remotos ejecutar código PHP de su elección a través del parámetro text. • https://www.exploit-db.com/exploits/5194 http://secunia.com/advisories/29099 http://securityreason.com/securityalert/3706 http://www.securityfocus.com/archive/1/488734/100/0/threaded http://www.securityfocus.com/bid/27985 https://exchange.xforce.ibmcloud.com/vulnerabilities/40831 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 2

PHP remote file inclusion vulnerability in modules/syntax_highlight.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the libpath parameter. Vulnerabilidad de inclusión remota de ficheros PHP en modules/syntax_highlight.php en las extensiones para Wordpress Sniplets 1.1.2 y 1.2.2 permite a atacantes remotos ejecutar código PHP de su elección mediante una URL el parámetro libpath. • https://www.exploit-db.com/exploits/5194 http://secunia.com/advisories/29099 http://securityreason.com/securityalert/3706 http://www.securityfocus.com/archive/1/488734/100/0/threaded http://www.securityfocus.com/bid/27985 https://exchange.xforce.ibmcloud.com/vulnerabilities/40829 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •