A vulnerability, which was classified as problematic, has been found in paytiumsupport Paytium Plugin up to 4.3.7 on WordPress. Affected by this issue is the function paytium_sw_save_api_keys. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2023-7289. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in nik00726 Video Grid Plugin up to 1.21 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation of the argument search_term leads to cross site scripting.
This vulnerability is known as CVE-2023-7295. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in heateor Social Sharing Plugin up to 3.3.3 on WordPress. Affected is the function heateor_sss_sharing_count. The manipulation of the argument urls leads to cross site scripting.
This vulnerability is traded as CVE-2022-4971. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in paytiumsupport Paytium Plugin up to 4.3.7 on WordPress. It has been declared as problematic. This vulnerability affects the function paytium_notice_dismiss of the component Notifications Handler. The manipulation leads to missing authorization.
This vulnerability was named CVE-2023-7292. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in paytiumsupport Paytium Plugin up to 4.3.7 on WordPress. It has been rated as problematic. This issue affects the function create_mollie_account. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2023-7291. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in paytiumsupport Paytium Plugin up to 4.3.7 on WordPress. It has been classified as problematic. This affects the function check_for_verified_profiles. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2023-7290. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in bc2018 Landing Page Plugin up to 0.99 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2020-36839. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in starfishwp Rich Reviews Plugin up to 1.7.4 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument update leads to cross site scripting.
This vulnerability is known as CVE-2019-25216. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in MainWP Dashboard Plugin up to 3.1.2 on WordPress. Affected is an unknown function. The manipulation of the argument mwp_setup_purchase_username leads to cross site scripting.
This vulnerability is traded as CVE-2016-15041. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Freemius SDK up to 2.0.1 on WordPress. This issue affects the function _get_debug_log/_get_db_option/_set_db_option. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2022-4974. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in strategy11team Formidable Forms Plugin up to 2.05.02 on WordPress. This vulnerability affects unknown code. The manipulation of the argument after_html leads to cross site scripting.
This vulnerability was named CVE-2017-20192. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in paytiumsupport Paytium Plugin up to 4.3.7 on WordPress. This affects the function update_profile_preference of the component Setting Handler. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2023-7288. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in paytiumsupport Paytium Plugin up to 4.3.7 on WordPress. It has been rated as problematic. Affected by this issue is the function pt_cancel_subscription of the component Subscription Handler. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2023-7287. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in podpirate ACF Quick Edit Fields Plugin up to 3.2.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to authorization bypass.
This vulnerability is known as CVE-2023-7286. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in WordPress. It has been classified as problematic. Affected is the function the_meta of the component Editor Page. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2022-4973. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in pickplugins Post Grid and Gutenberg Blocks Plugin up to 2.1.12 on WordPress and classified as critical. This issue affects some unknown processing. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2021-4450. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in SolarWinds Serv-U up to 15.4.2 HF 2 and classified as critical. This vulnerability affects unknown code of the component Environment Variable Handler. The manipulation leads to path traversal.
This vulnerability was named CVE-2024-45711. The attack can be initiated remotely. There is no exploit available.