Filtered by vendor Presstigers
Subscribe
Total
10 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-52122 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | N/A | 4.3 MEDIUM |
Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Job Board.This issue affects Simple Job Board: from n/a through 2.10.6. | |||||
CVE-2023-48283 | 1 Presstigers | 1 Simple Testimonials Showcase | 2024-11-21 | N/A | 4.3 MEDIUM |
Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Testimonials Showcase allows Cross Site Request Forgery.This issue affects Simple Testimonials Showcase: from n/a through 1.1.5. | |||||
CVE-2023-29440 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Job Board plugin <= 2.10.3 versions. | |||||
CVE-2022-2558 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | N/A | 5.3 MEDIUM |
The Simple Job Board WordPress plugin before 2.10.0 is susceptible to Directory Listing which allows the public listing of uploaded resumes in certain configurations. | |||||
CVE-2022-25612 | 1 Presstigers | 1 Simple Event Planner | 2024-11-21 | 3.5 LOW | 4.1 MEDIUM |
Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in Simple Event Planner WordPress plugin <= 1.5.4 allows user with author or higher user rights inject the malicious code via vulnerable parameters: &custom[event_organiser], &custom[organiser_email], &custom[organiser_contact]. | |||||
CVE-2022-25611 | 1 Presstigers | 1 Simple Event Planner | 2024-11-21 | 3.5 LOW | 4.1 MEDIUM |
Authenticated Stored Cross-Site Scripting (XSS) in Simple Event Planner plugin <= 1.5.4 allows attackers with contributor or higher user roles to inject the malicious script by using vulnerable parameter &custom[add_seg][]. | |||||
CVE-2021-39328 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | 3.5 LOW | 5.5 MEDIUM |
The Simple Job Board WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping on the $job_board_privacy_policy_label variable echo'd out via the ~/admin/settings/class-simple-job-board-settings-privacy.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.9.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | |||||
CVE-2020-35749 | 1 Presstigers | 1 Simple Board Job | 2024-11-21 | 4.0 MEDIUM | 7.7 HIGH |
Directory traversal vulnerability in class-simple_job_board_resume_download_handler.php in the Simple Board Job plugin 2.9.3 and earlier for WordPress allows remote attackers to read arbitrary files via the sjb_file parameter to wp-admin/post.php. | |||||
CVE-2017-18498 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
The simple-job-board plugin before 2.4.4 for WordPress has reflected XSS via keyword search. | |||||
CVE-2024-7351 | 1 Presstigers | 1 Simple Job Board | 2024-09-27 | N/A | 7.2 HIGH |
The Simple Job Board plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.12.3 via deserialization of untrusted input when editing job applications. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. |