CWE:
 

Topic
Date
Author
Low
Listeo WordPress Theme <= 1.6.10 - Multiple Authenticated IDOR Vulnerabilities
17.05.2021
m0ze
Med.
HomeSweet - Real Estate WordPress Theme v1.4 - IDOR leading to arbitrary deletion of ads
13.07.2020
Vlad Vector
Med.
CarSpot – Dealership Wordpress Classified Theme v2.2.0 Multiple Vulnerabilities
17.01.2020
m0ze
Med.
Fortify Software Security Center (SSC) 17.10/17.20/18.10 Information Disclosure (2)
24.12.2018
alt3kx


CVEMAP Search Results

CVE
Details
Description
2022-01-12
Waiting for details
CVE-2021-3852

Updating...
 

 
growi is vulnerable to Authorization Bypass Through User-Controlled Key

 
2022-01-03
Medium
CVE-2021-45428

Updating...
 

 
TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.

 
2021-12-29
Waiting for details
CVE-2021-44160

Updating...
 

 

 
2021-12-14
Low
CVE-2021-43820

Vendor: Seafile
Software: Seafile server
 

 
Seafile is an open source cloud storage system. A sync token is used in Seafile file syncing protocol to authorize access to library data. To improve performance, the token is cached in memory in seaf-server. Upon receiving a token from sync client or SeaDrive client, the server checks whether the token exist in the cache. However, if the token exists in cache, the server doesn't check whether it's associated with the specific library in the URL. This vulnerability makes it possible to use any valid sync token to access data from any **known** library. Note that the attacker has to first find out the ID of a library which it has no access to. The library ID is a random UUID, which is not possible to be guessed. There are no workarounds for this issue.

 
2021-12-01
Low
CVE-2021-3964

Vendor: ELGG
Software: ELGG
 

 
elgg is vulnerable to Authorization Bypass Through User-Controlled Key

 
2021-11-30
Low
CVE-2021-36329

Vendor: DELL
Software: Emc streamin...
 

 
Dell EMC Streaming Data Platform versions before 1.3 contain an Indirect Object Reference Vulnerability. A remote malicious user may potentially exploit this vulnerability to gain sensitive information.

 
2021-11-23
Medium
CVE-2021-24892

Vendor: Advanced forms project
Software: Advanced forms
 

 
Insecure Direct Object Reference in edit function of Advanced Forms (Free & Pro) before 1.6.9 allows authenticated remote attacker to change arbitrary user's email address and request for reset password, which could lead to take over of WordPress's administrator account. To exploit this vulnerability, an attacker must register to obtain a valid WordPress's user and use such user to authenticate with WordPress in order to exploit the vulnerable edit function.

 
2021-11-19
Medium
CVE-2021-22951

Vendor: Concretecms
Software: Concrete cms
 

 
Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.Credit for discovery: "Solar Security Research Team"Concrete CMS security team CVSS scoring is 5.3: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NThis fix is also in Concrete version 9.0.0

 
Medium
CVE-2021-22967

Vendor: Concretecms
Software: Concrete cms
 

 

 
2021-11-08
Medium
CVE-2021-24840

Vendor: Codesupply
Software: Squaretype
 

 
The Squaretype WordPress theme before 3.0.4 allows unauthenticated users to manipulate the query_vars used to retrieve the posts to display in one of its REST endpoint, without any validation. As a result, private and scheduled posts could be retrieved via a crafted request.

 

 


Copyright 2022, cxsecurity.com

 

Back to Top