ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
158,901 |
CVE-2021-24660
| 5.4 | 3.5 |
MEDIUM
|
The PostX – Gutenberg Blocks for Post Grid WordPress plugin before 2.4.10, with Saved Templates Addon enabled, allows users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks via the plugin's shortcode.
|
CWE-79
|
158,902 |
CVE-2021-24661
| 4.3 | 3.5 |
MEDIUM
|
The PostX – Gutenberg Blocks for Post Grid WordPress plugin before 2.4.10, with Saved Templates Addon enabled, allows users with Contributor roles or higher to read password-protected or private post contents the user is otherwise unable to read, given the post ID.
|
CWE-200
|
158,903 |
CVE-2021-24662
| 7.2 | 6.5 |
HIGH
|
The Game Server Status WordPress plugin through 1.0 does not validate or escape the server_id parameter before using it in SQL statement, leading to an Authenticated SQL Injection in an admin page
|
CWE-89
|
158,904 |
CVE-2021-24663
| 7.2 | 6.5 |
HIGH
|
The Simple Schools Staff Directory WordPress plugin through 1.1 does not validate uploaded logo pictures to ensure that are indeed images, allowing high privilege users such as admin to upload arbitrary file like PHP, leading to RCE
|
CWE-434
|
158,905 |
CVE-2021-24664
| 4.8 | 3.5 |
MEDIUM
|
The School Management System – WPSchoolPress WordPress plugin before 2.1.17 sanitise some fields using sanitize_text_field() but does not escape them before outputting in attributes, resulting in Stored Cross-Site Scripting issues.
|
CWE-79
|
158,906 |
CVE-2021-24665
| 5.4 | 3.5 |
MEDIUM
|
The WP Video Lightbox WordPress plugin before 1.9.3 does not escape the attributes of its shortcodes, allowing users with a role as low as contributor to perform Cross-Site Scripting attacks
|
CWE-79
|
158,907 |
CVE-2021-24666
| 9.8 | 6.8 |
CRITICAL
|
The Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P<id>[\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.
|
CWE-89
|
158,908 |
CVE-2021-24667
| 5.4 | 3.5 |
MEDIUM
|
A stored cross-site scripting vulnerability has been discovered in : Simply Gallery Blocks with Lightbox (Version – 2.2.0 & below). The vulnerability exists in the Lightbox functionality where a user with low privileges is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of image parameters in meta data.
|
CWE-79
|
158,909 |
CVE-2021-24668
| 4.3 | 4.3 |
MEDIUM
|
The MAZ Loader WordPress plugin through 1.3.4 does not enforce nonce checks, which allows attackers to make administrators delete arbitrary loaders via a CSRF attack
|
CWE-352
|
158,910 |
CVE-2021-24669
| 8.8 | 6.5 |
HIGH
|
The MAZ Loader – Preloader Builder for WordPress plugin before 1.3.3 does not validate or escape the loader_id parameter of the mzldr shortcode, which allows users with a role as low as Contributor to perform SQL injection.
|
CWE-89
|
158,911 |
CVE-2021-24670
| 5.4 | 3.5 |
MEDIUM
|
The CoolClock WordPress plugin before 4.3.5 does not escape some shortcode attributes, allowing users with a role as low as Contributor toperform Stored Cross-Site Scripting attacks
|
CWE-79
|
158,912 |
CVE-2021-24671
| 5.4 | 3.5 |
MEDIUM
|
The MX Time Zone Clocks WordPress plugin before 3.4.1 does not escape the time_zone attribute of the mxmtzc_time_zone_clocks shortcode, allowing users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks
|
CWE-79
|
158,913 |
CVE-2021-24672
| 5.4 | 3.5 |
MEDIUM
|
The One User Avatar WordPress plugin before 2.3.7 does not escape the link and target attributes of its shortcode, allowing users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks
|
CWE-79
|
158,914 |
CVE-2021-24673
| 4.8 | 3.5 |
MEDIUM
|
The Appointment Hour Booking WordPress plugin before 1.3.16 does not escape some of the Calendar Form settings, allowing high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,915 |
CVE-2021-24674
| 6.5 | 4.3 |
MEDIUM
|
The Genie WP Favicon WordPress plugin through 0.5.2 does not have CSRF in place when updating the favicon, which could allow attackers to make a logged in admin change it via a CSRF attack
|
CWE-352
|
158,916 |
CVE-2021-24675
| 6.5 | 4.3 |
MEDIUM
|
The One User Avatar WordPress plugin before 2.3.7 does not check for CSRF when updating the Avatar in page where the [avatar_upload] shortcode is embed. As a result, attackers could make logged in user change their avatar via a CSRF attack
|
CWE-352
|
158,917 |
CVE-2021-24676
| 6.1 | 4.3 |
MEDIUM
|
The Better Find and Replace WordPress plugin before 1.2.9 does not escape the 's' GET parameter before outputting back in the All Masking Rules page, leading to a Reflected Cross-Site Scripting issue
|
CWE-79
|
158,918 |
CVE-2021-24677
| 5.3 | 5 |
MEDIUM
|
The Find My Blocks WordPress plugin before 3.4.0 does not have authorisation checks in its REST API, which could allow unauthenticated users to enumerate private posts' titles.
|
CWE-862
|
158,919 |
CVE-2021-24678
| 5.4 | 3.5 |
MEDIUM
|
The CM Tooltip Glossary WordPress plugin before 3.9.21 does not escape some glossary_tooltip shortcode attributes, which could allow users a role as low as Contributor to perform Stored Cross-Site Scripting attacks
|
CWE-79
|
158,920 |
CVE-2021-24679
| 6.1 | 4.3 |
MEDIUM
|
The Bitcoin / AltCoin Payment Gateway for WooCommerce WordPress plugin before 1.6.1 does not escape the 's' GET parameter before outputting back in the All Masking Rules page, leading to a Reflected Cross-Site Scripting issue
|
CWE-79
|
158,921 |
CVE-2021-24681
| 4.8 | 3.5 |
MEDIUM
|
The Duplicate Page WordPress plugin through 4.4.2 does not sanitise or escape the Duplicate Post Suffix settings before outputting it, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,922 |
CVE-2021-24682
| 5.4 | 3.5 |
MEDIUM
|
The Cool Tag Cloud WordPress plugin before 2.26 does not escape the style attribute of the cool_tag_cloud shortcode, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks.
|
CWE-79
|
158,923 |
CVE-2021-24683
| 5.4 | 4.3 |
MEDIUM
|
The Weather Effect WordPress plugin before 1.3.4 does not have any CSRF checks in place when saving its settings, and do not validate or escape them, which could lead to Stored Cross-Site Scripting issue.
|
CWE-352
|
158,924 |
CVE-2021-24684
| 8.8 | 9 |
HIGH
|
The WordPress PDF Light Viewer Plugin WordPress plugin before 1.4.12 allows users with Author roles to execute arbitrary OS command on the server via OS Command Injection when invoking Ghostscript.
|
CWE-78
|
158,925 |
CVE-2021-24685
| 5.4 | 5 |
MEDIUM
|
The Flat Preloader WordPress plugin before 1.5.4 does not enforce nonce checks when saving its settings, as well as does not sanitise and escape them, which could allow attackers to a make logged in admin change them with a Cross-Site Scripting payload (triggered either in the frontend or backend depending on the payload)
|
CWE-352
|
158,926 |
CVE-2021-24687
| 4.8 | 3.5 |
MEDIUM
|
The Modern Events Calendar Lite WordPress plugin before 5.22.2 does not escape some of its settings before outputting them in attributes, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,927 |
CVE-2021-24690
| 5.4 | 3.5 |
MEDIUM
|
The Chained Quiz WordPress plugin before 1.2.7.2 does not properly sanitize or escape inputs in the plugin's settings.
|
CWE-79
|
158,928 |
CVE-2021-24691
| 4.8 | 3.5 |
MEDIUM
|
The Quiz And Survey Master WordPress plugin before 7.3.2 does not escape the Quiz Url Slug setting before outputting it in some pages, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
|
CWE-79
|
158,929 |
CVE-2021-24693
| 9 | 6 |
CRITICAL
|
The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the "File Thumbnail" post meta before outputting it in some pages, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. Given the that XSS is triggered even when the Download is in a review state, contributor could make JavaScript code execute in a context of a reviewer such as admin and make them create a rogue admin account, or install a malicious plugin
|
CWE-79
|
158,930 |
CVE-2021-24695
| 7.5 | 5 |
HIGH
|
The Simple Download Monitor WordPress plugin before 3.9.6 saves logs in a predictable location, and does not have any authentication or authorisation in place to prevent unauthenticated users to download and read the logs containing Sensitive Information such as IP Addresses and Usernames
|
CWE-200
|
158,931 |
CVE-2021-24697
| 6.1 | 4.3 |
MEDIUM
|
The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the 1) sdm_active_tab GET parameter and 2) sdm_stats_start_date/sdm_stats_end_date POST parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
|
CWE-79
|
158,932 |
CVE-2021-24698
| 4.3 | 4 |
MEDIUM
|
The Simple Download Monitor WordPress plugin before 3.9.6 allows users with a role as low as Contributor to remove thumbnails from downloads they do not own, even if they cannot normally edit the download.
|
NVD-CWE-noinfo
|
158,933 |
CVE-2021-24699
| 5.4 | 3.5 |
MEDIUM
|
The Easy Media Download WordPress plugin before 1.1.7 does not escape the text argument of its shortcode, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks.
|
CWE-79
|
158,934 |
CVE-2021-24700
| 4.8 | 3.5 |
MEDIUM
|
The Forminator WordPress plugin before 1.15.4 does not sanitize and escape the email field label, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed
|
CWE-79
|
158,935 |
CVE-2021-24701
| 4.8 | 3.5 |
MEDIUM
|
The Quiz Tool Lite WordPress plugin through 2.3.15 does not sanitize multiple input fields used when creating or managing quizzes and in other setting options, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,936 |
CVE-2021-24702
| 4.8 | 2.1 |
MEDIUM
|
The LearnPress WordPress plugin before 4.1.3.1 does not properly sanitize or escape various inputs within course settings, which could allow high privilege users to perform Cross-Site Scripting attacks when the unfiltred_html capability is disallowed
|
CWE-79
|
158,937 |
CVE-2021-24703
| 5.7 | 3.5 |
MEDIUM
|
The Download Plugin WordPress plugin before 1.6.1 does not have capability and CSRF checks in the dpwap_plugin_activate AJAX action, allowing any authenticated users, such as subscribers, to activate plugins that are already installed.
|
CWE-732
|
158,938 |
CVE-2021-24705
| 4.8 | 3.5 |
MEDIUM
|
The NEX-Forms WordPress plugin through 7.9.4 does not escape some of its settings and form fields before outputting them in attributes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,939 |
CVE-2021-24706
| 4.8 | 3.5 |
MEDIUM
|
The Qwizcards – online quizzes and flashcards WordPress plugin before 3.62 does not properly sanitize and escape some of its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,940 |
CVE-2021-24708
| 4.8 | 3.5 |
MEDIUM
|
The Export any WordPress data to XML/CSV WordPress plugin before 1.3.1 does not escape its Export's Name before outputting it in Manage Exports settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
|
CWE-79
|
158,941 |
CVE-2021-24709
| 4.8 | 3.5 |
MEDIUM
|
The Weather Effect WordPress plugin before 1.3.6 does not properly validate and escape some of its settings (like *_size_leaf, *_flakes_leaf, *_speed) which could lead to Stored Cross-Site Scripting issues
|
CWE-79
|
158,942 |
CVE-2021-2471
| 5.9 | 7.9 |
MEDIUM
|
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H).
|
NVD-CWE-noinfo
|
158,943 |
CVE-2021-24710
| 4.8 | 3.5 |
MEDIUM
|
The Print-O-Matic WordPress plugin before 2.0.3 does not escape some of its settings before outputting them in attribute, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,944 |
CVE-2021-24711
| 8.8 | 6.8 |
HIGH
|
The del_reistered_domains AJAX action of the Software License Manager WordPress plugin before 4.5.1 does not have any CSRF checks, and is vulnerable to a CSRF attack
|
CWE-352
|
158,945 |
CVE-2021-24712
| 5.4 | 3.5 |
MEDIUM
|
The Appointment Hour Booking WordPress plugin before 1.3.17 does not properly sanitize values used when creating new calendars.
|
CWE-79
|
158,946 |
CVE-2021-24713
| 4.8 | 3.5 |
MEDIUM
|
The Video Lessons Manager WordPress plugin before 1.7.2 and Video Lessons Manager Pro WordPress plugin before 3.5.9 do not properly sanitize and escape values when updating their settings, which could allow high privilege users to perform Cross-Site Scripting attacks
|
CWE-79
|
158,947 |
CVE-2021-24714
| 4.8 | 3.5 |
MEDIUM
|
The Import any XML or CSV File to WordPress plugin before 3.6.3 does not escape the Import's Title and Unique Identifier fields before outputting them in admin pages, which could allow high privilege users to perform Cross-Site attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,948 |
CVE-2021-24715
| 4.8 | 3.5 |
MEDIUM
|
The WP Sitemap Page WordPress plugin before 1.7.0 does not properly sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,949 |
CVE-2021-24716
| 5.4 | 3.5 |
MEDIUM
|
The Modern Events Calendar Lite WordPress plugin before 5.22.3 does not properly sanitize or escape values set by users with access to adjust settings withing wp-admin.
|
CWE-79
|
158,950 |
CVE-2021-24717
| 8.8 | 6.5 |
HIGH
|
The AutomatorWP WordPress plugin before 1.7.6 does not perform capability checks which allows users with Subscriber roles to enumerate automations, disclose title of private posts or user emails, call functions, or perform privilege escalation via Ajax actions.
|
CWE-863
|
158,951 |
CVE-2021-24718
| 4.8 | 3.5 |
MEDIUM
|
The Contact Form, Survey & Popup Form Plugin for WordPress plugin before 1.5 does not properly sanitize some of its settings allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
|
CWE-79
|
158,952 |
CVE-2021-24719
| 6.1 | 4.3 |
MEDIUM
|
The Enfold Enfold WordPress theme before 4.8.4 was vulnerable to Reflected Cross-Site Scripting (XSS). The vulnerability is present on Enfold versions previous than 4.8.4 which use Avia Page Builder.
|
CWE-79
|
158,953 |
CVE-2021-24719
| 6.1 | 4.3 |
MEDIUM
|
The Enfold Enfold WordPress theme before 4.8.4 was vulnerable to Reflected Cross-Site Scripting (XSS). The vulnerability is present on Enfold versions previous than 4.8.4 which use Avia Page Builder.
|
CWE-79
|
158,954 |
CVE-2021-24720
| 5.4 | 3.5 |
MEDIUM
|
The GeoDirectory Business Directory WordPress plugin before 2.1.1.3 was vulnerable to Authenticated Stored Cross-Site Scripting (XSS).
|
CWE-79
|
158,955 |
CVE-2021-24721
| 6.5 | 4 |
MEDIUM
|
The Loco Translate WordPress plugin before 2.5.4 mishandles data inputs which get saved to a file, which can be renamed to an extension ending in .php, resulting in authenticated "translator" users being able to inject PHP code into files ending with .php in web accessible locations.
|
CWE-94
|
158,956 |
CVE-2021-24722
| 4.8 | 3.5 |
MEDIUM
|
The Restaurant Menu by MotoPress WordPress plugin before 2.4.2 does not properly sanitize or escape inputs when creating new menu items, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
|
CWE-79
|
158,957 |
CVE-2021-24723
| 5.4 | 3.5 |
MEDIUM
|
The WP Reactions Lite WordPress plugin before 1.3.6 does not properly sanitize inputs within wp-admin pages, allowing users with sufficient access to inject XSS payloads within /wp-admin/ pages.
|
CWE-79
|
158,958 |
CVE-2021-24724
| 5.4 | 3.5 |
MEDIUM
|
The Timetable and Event Schedule by MotoPress WordPress plugin before 2.3.19 does not sanitise some of its parameters, which could allow low privilege users such as author to perform XSS attacks against frontend and backend users when viewing the related event/s
|
CWE-79
|
158,959 |
CVE-2021-24725
| 4.3 | 4.3 |
MEDIUM
|
The Comment Link Remove and Other Comment Tools WordPress plugin before 2.1.6 does not have CSRF check in its 'Delete comments easily', which could allow attackers to make logged in admin delete arbitrary comments
|
CWE-352
|
158,960 |
CVE-2021-24726
| 8.8 | 6.5 |
HIGH
|
The WP Simple Booking Calendar WordPress plugin before 2.0.6 did not escape, validate or sanitise the orderby parameter in its Search Calendars action, before using it in a SQL statement, leading to an authenticated SQL injection issue
|
CWE-89
|
158,961 |
CVE-2021-24727
| 8.8 | 6.5 |
HIGH
|
The StopBadBots WordPress plugin before 6.60 did not validate or escape the order and orderby GET parameter in some of its admin dashboard pages, leading to Authenticated SQL Injections
|
CWE-89
|
158,962 |
CVE-2021-24728
| 8.8 | 6.5 |
HIGH
|
The Membership & Content Restriction – Paid Member Subscriptions WordPress plugin before 2.4.2 did not sanitise, validate or escape its order and orderby parameters before using them in SQL statement, leading to Authenticated SQL Injections in the Members and Payments pages.
|
CWE-79
|
158,963 |
CVE-2021-24729
| 5.4 | 3.5 |
MEDIUM
|
The Logo Showcase with Slick Slider WordPress plugin before 1.2.4 does not sanitise the Grid Settings, which could allow users with a role as low as Author to perform stored Cross-Site Scripting attacks via post metadata of Grid logo showcase.
|
CWE-79
|
158,964 |
CVE-2021-24731
| 9.8 | 7.5 |
CRITICAL
|
The Registration Forms – User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.7.1.6 does not properly escape user data before using it in a SQL statement in the wp-json/pie/v1/login REST API endpoint, leading to an SQL injection.
|
CWE-89
|
158,965 |
CVE-2021-24732
| 5.4 | 3.5 |
MEDIUM
|
The PDF Flipbook, 3D Flipbook WordPress – DearFlip WordPress plugin before 1.7.10 does not escape the class attribute of its shortcode before outputting it back in an attribute, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks
|
CWE-79
|
158,966 |
CVE-2021-24734
| 5.4 | 3.5 |
MEDIUM
|
The Compact WP Audio Player WordPress plugin before 1.9.7 does not escape some of its shortcodes attributes, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks.
|
CWE-79
|
158,967 |
CVE-2021-24735
| 6.5 | 4.3 |
MEDIUM
|
The Compact WP Audio Player WordPress plugin before 1.9.7 does not implement nonce checks, which could allow attackers to make a logged in admin change the "Disable Simultaneous Play" setting via a CSRF attack.
|
CWE-352
|
158,968 |
CVE-2021-24736
| 4.8 | 3.5 |
MEDIUM
|
The Easy Download Manager and File Sharing Plugin with frontend file upload – a better Media Library — Shared Files WordPress plugin before 1.6.57 does not sanitise and escape some of its settings before outputting them in attributes, which could lead to Stored Cross-Site Scripting issues.
|
CWE-79
|
158,969 |
CVE-2021-24737
| 4.8 | 3.5 |
MEDIUM
|
The Comments – wpDiscuz WordPress plugin through 7.3.0 does not properly sanitise or escape the Follow and Unfollow messages before outputting them in the page, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,970 |
CVE-2021-24738
| 5.4 | 3.5 |
MEDIUM
|
The Logo Carousel WordPress plugin before 3.4.2 does not validate and escape the "Logo Margin" carousel option, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks
|
CWE-79
|
158,971 |
CVE-2021-24739
| 8.1 | 5.5 |
HIGH
|
The Logo Carousel WordPress plugin before 3.4.2 allows users with a role as low as Contributor to duplicate and view arbitrary private posts made by other users via the Carousel Duplication feature
|
CWE-285
|
158,972 |
CVE-2021-2474
| 8.1 | 8.5 |
HIGH
|
Vulnerability in the Oracle Web Analytics product of Oracle E-Business Suite (component: Admin). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Web Analytics. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Web Analytics accessible data as well as unauthorized access to critical data or complete access to all Oracle Web Analytics accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
NVD-CWE-noinfo
|
158,973 |
CVE-2021-24740
| 4.8 | 3.5 |
MEDIUM
|
The Tutor LMS WordPress plugin before 1.9.9 does not escape some of its settings before outputting them in attributes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
CWE-79
|
158,974 |
CVE-2021-24741
| 9.8 | 7.5 |
CRITICAL
|
The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated users.
|
CWE-89
|
158,975 |
CVE-2021-24742
| 6.5 | 4 |
MEDIUM
|
The Logo Slider and Showcase WordPress plugin before 1.3.37 allows Editor users to update the plugin's settings via the rtWLSSettings AJAX action because it uses a nonce for authorisation instead of a capability check.
|
CWE-863
|
158,976 |
CVE-2021-24743
| 5.4 | 3.5 |
MEDIUM
|
The Podcast Subscribe Buttons WordPress plugin before 1.4.2 allows users with any role capable of editing or adding posts to perform stored XSS.
|
CWE-79
|
158,977 |
CVE-2021-24744
| 4.8 | 3.5 |
MEDIUM
|
The WordPress Contact Forms by Cimatti WordPress plugin before 1.4.12 does not sanitise and escape the Form Title before outputting it in some admin pages. which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.
|
CWE-79
|
158,978 |
CVE-2021-24745
| 5.4 | 3.5 |
MEDIUM
|
The About Author Box WordPress plugin before 1.0.2 does not sanitise and escape the Social Profiles field values before outputting them in attributes, which could allow user with a role as low as contributor to perform Cross-Site Scripting attacks.
|
CWE-79
|
158,979 |
CVE-2021-24747
| 7.2 | 6.5 |
HIGH
|
The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections.
|
CWE-89
|
158,980 |
CVE-2021-24748
| 8.8 | 6.5 |
HIGH
|
The Email Before Download WordPress plugin before 6.8 does not properly validate and escape the order and orderby GET parameters before using them in SQL statements, leading to authenticated SQL injection issues
|
CWE-89
|
158,981 |
CVE-2021-24749
| 4.3 | 4.3 |
MEDIUM
|
The URL Shortify WordPress plugin before 1.5.1 does not have CSRF check in place when bulk-deleting links or groups, which could allow attackers to make a logged in admin delete arbitrary link and group via a CSRF attack.
|
CWE-352
|
158,982 |
CVE-2021-2475
| 4.4 | 2.1 |
MEDIUM
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
NVD-CWE-noinfo
|
158,983 |
CVE-2021-24750
| 8.8 | 6.5 |
HIGH
|
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks
|
CWE-89
|
158,984 |
CVE-2021-24751
| 5.4 | 3.5 |
MEDIUM
|
The GenerateBlocks WordPress plugin before 1.4.0 does not validate the generateblocks/container block's tagName attribute, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks.
|
CWE-79
|
158,985 |
CVE-2021-24752
| 5.7 | 3.5 |
MEDIUM
|
Multiple Plugins from the CatchThemes vendor do not perform capability and CSRF checks in the ctp_switch AJAX action, which could allow any authenticated users, such as Subscriber to change the Essential Widgets WordPress plugin before 1.9, To Top WordPress plugin before 2.3, Header Enhancement WordPress plugin before 1.5, Generate Child Theme WordPress plugin before 1.6, Essential Content Types WordPress plugin before 1.9, Catch Web Tools WordPress plugin before 2.7, Catch Under Construction WordPress plugin before 1.4, Catch Themes Demo Import WordPress plugin before 1.6, Catch Sticky Menu WordPress plugin before 1.7, Catch Scroll Progress Bar WordPress plugin before 1.6, Social Gallery and Widget WordPress plugin before 2.3, Catch Infinite Scroll WordPress plugin before 1.9, Catch Import Export WordPress plugin before 1.9, Catch Gallery WordPress plugin before 1.7, Catch Duplicate Switcher WordPress plugin before 1.6, Catch Breadcrumb WordPress plugin before 1.7, Catch IDs WordPress plugin before 2.4's configurations.
|
CWE-352
|
158,986 |
CVE-2021-24754
| 7.2 | 6.5 |
HIGH
|
The MainWP Child Reports WordPress plugin before 2.0.8 does not validate or sanitise the order parameter before using it in a SQL statement in the admin dashboard, leading to an SQL injection issue
|
CWE-89
|
158,987 |
CVE-2021-24755
| 8.8 | 6.5 |
HIGH
|
The myCred WordPress plugin before 2.3 does not validate or escape the fields parameter before using it in a SQL statement, leading to an SQL injection exploitable by any authenticated user
|
CWE-89
|
158,988 |
CVE-2021-24756
| 6.1 | 4.3 |
MEDIUM
|
The WP System Log WordPress plugin before 1.0.21 does not sanitise, validate and escape the IP address retrieved from login requests before outputting them in the admin dashboard, which could allow unauthenticated attacker to perform Cross-Site Scripting attacks against admins viewing the logs.
|
CWE-79
|
158,989 |
CVE-2021-24757
| 5.3 | 5 |
MEDIUM
|
The Stylish Price List WordPress plugin before 6.9.0 does not perform capability checks in its spl_upload_ser_img AJAX action (available to both unauthenticated and authenticated users), which could allow unauthenticated users to upload images.
|
CWE-863
|
158,990 |
CVE-2021-24758
| 8.8 | 6.5 |
HIGH
|
The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections
|
CWE-89
|
158,991 |
CVE-2021-24759
| 5.4 | 3.5 |
MEDIUM
|
The PDF.js Viewer WordPress plugin before 2.0.2 does not escape some of its shortcode and Gutenberg Block attributes, which could allow users with a role as low as Contributor to to perform Cross-Site Scripting attacks
|
CWE-79
|
158,992 |
CVE-2021-2476
| 5.3 | 5 |
MEDIUM
|
Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Authentication). The supported version that is affected is 6.4.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Transportation Management accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
NVD-CWE-noinfo
|
158,993 |
CVE-2021-24760
| 5.4 | 3.5 |
MEDIUM
|
The Gutenberg PDF Viewer Block WordPress plugin before 1.0.1 does not sanitise and escape its block, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.
|
CWE-79
|
158,994 |
CVE-2021-24766
| 6.5 | 4.3 |
MEDIUM
|
The 404 to 301 – Redirect, Log and Notify 404 Errors WordPress plugin before 3.0.9 does not have CSRF check in place when cleaning the logs, which could allow attacker to make a logged in admin delete all of them via a CSRF attack
|
CWE-352
|
158,995 |
CVE-2021-24767
| 6.5 | 4.3 |
MEDIUM
|
The Redirect 404 Error Page to Homepage or Custom Page with Logs WordPress plugin before 1.7.9 does not check for CSRF when deleting logs, which could allow attacker to make a logged in admin delete them via a CSRF attack
|
CWE-352
|
158,996 |
CVE-2021-24768
| 4.8 | 3.5 |
MEDIUM
|
The WP RSS Aggregator WordPress plugin before 4.19.2 does not properly sanitise and escape the URL to Blacklist field, allowing malicious HTML to be inserted by high privilege users even when the unfiltered_html capability is disallowed, which could lead to Cross-Site Scripting issues.
|
CWE-79
|
158,997 |
CVE-2021-24769
| 7.2 | 6.5 |
HIGH
|
The Permalink Manager Lite WordPress plugin before 2.2.13.1 does not validate and escape the orderby parameter before using it in a SQL statement in the Permalink Manager page, leading to a SQL Injection
|
CWE-89
|
158,998 |
CVE-2021-2477
| 5.3 | 5 |
MEDIUM
|
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Session Management). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Applications Framework. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
NVD-CWE-noinfo
|
158,999 |
CVE-2021-24770
| 6.5 | 4 |
MEDIUM
|
The Stylish Price List WordPress plugin before 6.9.1 does not perform capability checks in its spl_upload_ser_img AJAX action (available to authenticated users), which could allow any authenticated users, such as subscriber, to upload arbitrary images.
|
CWE-863
|
159,000 |
CVE-2021-24771
| 4.8 | 3.5 |
MEDIUM
|
The Inspirational Quote Rotator WordPress plugin through 1.0.0 does not sanitize and escape some of its quote fields when adding/editing a quote as admin, leading to Stored Cross-Site scripting issues when the quote is output in the "Quotes list" even when the unfiltered_html capability is disallowed
|
CWE-79
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.