Security
Headlines
HeadlinesLatestCVEs

Source

CVE

CVE-2021-4408: Handle.php in dw-question-answer/trunk/inc – WordPress Plugin Repository

The DW Question & Answer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.8. This is due to missing or incorrect nonce validation on the update_answer() function. This makes it possible for unauthenticated attackers to update answers to questions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE
#sql#wordpress#php#auth
CVE-2021-4417: Changeset 2368977 for forminator/trunk/library/class-export.php – WordPress Plugin Repository

The Forminator – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.13.4. This is due to missing or incorrect nonce validation on the listen_for_saving_export_schedule() function. This makes it possible for unauthenticated attackers to export form submissions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4415: Sunshine Photo Cart <= 2.8.28 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Sunshine Photo Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.8.28 This is due to missing or incorrect nonce validation on the sunshine_products_quicksave_post() function. This makes it possible for unauthenticated attackers to save custom post data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4414: Abandoned Cart Lite for WooCommerce <= 5.8.5 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.8.5. This is due to missing or incorrect nonce validation on the wcal_preview_emails() function. This makes it possible for unauthenticated attackers to generate email preview templates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4413: Process Steps Template Designer <= 1.2.1 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Process Steps Template Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save field icons via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4412: WP Prayer <= 1.6.5 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The WP Prayer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.5. This is due to missing or incorrect nonce validation on the save() and export() functions. This makes it possible for unauthenticated attackers to save plugin settings and trigger a data export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4407: Custom Banners <= 3.2.2 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Custom Banners plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.2.2 This is due to missing or incorrect nonce validation on the saveCustomFields() function. This makes it possible for unauthenticated attackers to save custom fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2020-36750: Changeset 2417429 for ewww-image-optimizer/trunk/classes/class-ewww-nextgen.php – WordPress Plugin Repository

The EWWW Image Optimizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.8.1. This is due to missing or incorrect nonce validation on the ewww_ngg_bulk_init() function. This makes it possible for unauthenticated attackers to perform bulk image optimization via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2023-30226: ELF: added vn_next break condition (#3214) · rizinorg/rizin@a6d89de

An issue was discovered in function get_gnu_verneed in rizinorg Rizin prior to 0.5.0 verneed_entry allows attackers to cause a denial of service via crafted elf file.

CVE-2023-37766: SEGV on unknown address 0x000000000038 · Issue #2516 · gpac/gpac

GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_isom_remove_user_data function at /lib/libgpac.so.