Vulnerabilities (CVE)

Filtered by vendor Quantumcloud Subscribe
Total 32 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-1651 1 Quantumcloud 1 Ai Chatbot 2024-11-21 N/A 5.4 MEDIUM
The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in the AJAX action responsible to update the OpenAI settings, allowing any authenticated users, such as subscriber to update them. Furthermore, due to the lack of escaping of the settings, this could also lead to Stored XSS
CVE-2023-1650 1 Quantumcloud 1 Ai Chatbot 2024-11-21 N/A 9.8 CRITICAL
The AI ChatBot WordPress plugin before 4.4.7 unserializes user input from cookies via an AJAX action available to unauthenticated users, which could allow them to perform PHP Object Injection when a suitable gadget is present on the blog
CVE-2023-1649 1 Quantumcloud 1 Ai Chatbot 2024-11-21 N/A 4.8 MEDIUM
The AI ChatBot WordPress plugin before 4.5.1 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
CVE-2023-1011 1 Quantumcloud 1 Ai Chatbot 2024-11-21 N/A 6.1 MEDIUM
The AI ChatBot WordPress plugin before 4.4.5 does not escape most of its settings before outputting them back in the dashboard, and does not have a proper CSRF check, allowing attackers to make a logged in admin set XSS payloads in them.
CVE-2022-47613 1 Quantumcloud 1 Ai Chatbot 2024-11-21 N/A 5.9 MEDIUM
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in QuantumCloud AI ChatBot plugin <= 4.3.0 versions.
CVE-2022-3074 1 Quantumcloud 1 Slider Hero 2024-11-21 N/A 4.8 MEDIUM
The Slider Hero WordPress plugin before 8.4.4 does not escape the slider Name, which could allow high-privileged users to perform Cross-Site Scripting attacks.
CVE-2022-0760 1 Quantumcloud 1 Simple Link Directory 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Simple Link Directory WordPress plugin before 7.7.2 does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection
CVE-2022-0747 1 Quantumcloud 1 Infographic Maker 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Infographic Maker WordPress plugin before 4.3.8 does not validate and escape the post_id parameter before using it in a SQL statement via the qcld_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection
CVE-2021-4424 1 Quantumcloud 1 Slider Hero 2024-11-21 N/A 4.3 MEDIUM
The Slider Hero plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.2.0. This is due to missing or incorrect nonce validation on the qc_slider_hero_duplicate() function. This makes it possible for unauthenticated attackers to duplicate slides via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2021-24725 1 Quantumcloud 1 Comment Link Remove And Other Comment Tools 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
The Comment Link Remove and Other Comment Tools WordPress plugin before 2.1.6 does not have CSRF check in its 'Delete comments easily', which could allow attackers to make logged in admin delete arbitrary comments
CVE-2021-24506 1 Quantumcloud 1 Slider Hero 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Slider Hero with Animation, Video Background & Intro Maker WordPress plugin before 8.2.7 does not sanitise or escape the id attribute of its hero-button shortcode before using it in a SQL statement, allowing users with a role as low as Contributor to perform SQL injection.
CVE-2019-13463 1 Quantumcloud 1 Simple Link Directory 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
An XSS vulnerability in qcopd-shortcode-generator.php in the Simple Link Directory plugin before 7.3.5 for WordPress allows remote attackers to inject arbitrary web script or HTML, because esc_html is not called for the "echo get_the_title()" or "echo $term->name" statement.