Filtered by vendor Themepunch
Subscribe
Total
13 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-37449 | 1 Themepunch | 1 Slider Revolution | 2024-11-21 | N/A | 5.9 MEDIUM |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemePunch OHG Slider Revolution.This issue affects Slider Revolution: from n/a through 6.7.13. | |||||
CVE-2024-34444 | 1 Themepunch | 1 Slider Revolution | 2024-11-21 | N/A | 7.1 HIGH |
Missing Authorization vulnerability in ThemePunch OHG Slider Revolution.This issue affects Slider Revolution: from n/a before 6.7.0. | |||||
CVE-2024-34443 | 1 Themepunch | 1 Slider Revolution | 2024-11-21 | N/A | 5.9 MEDIUM |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemePunch OHG Slider Revolution allows Stored XSS.This issue affects Slider Revolution: from n/a before 6.7.11. | |||||
CVE-2023-6528 | 1 Themepunch | 1 Slider Revolution | 2024-11-21 | N/A | 8.8 HIGH |
The Slider Revolution WordPress plugin before 6.6.19 does not prevent users with at least the Author role from unserializing arbitrary content when importing sliders, potentially leading to Remote Code Execution. | |||||
CVE-2023-47784 | 1 Themepunch | 1 Slider Revolution | 2024-11-21 | N/A | 8.4 HIGH |
Unrestricted Upload of File with Dangerous Type vulnerability in ThemePunch OHG Slider Revolution.This issue affects Slider Revolution: from n/a through 6.6.15. | |||||
CVE-2023-47772 | 1 Themepunch | 1 Slider Revolution | 2024-11-21 | N/A | 6.5 MEDIUM |
Contributor+ Stored Cross-Site Scripting (XSS) vulnerability in Slider Revolution <= 6.6.14. | |||||
CVE-2023-47684 | 1 Themepunch | 1 Essential Grid | 2024-11-21 | N/A | 7.1 HIGH |
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions. | |||||
CVE-2023-2359 | 1 Themepunch | 1 Slider Revolution | 2024-11-21 | N/A | 8.8 HIGH |
The Slider Revolution WordPress plugin through 6.6.12 does not check for valid image files upon import, leading to an arbitrary file upload which may be escalated to Remote Code Execution in some server configurations. | |||||
CVE-2015-9499 | 1 Themepunch | 1 Showbiz Pro | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Showbiz Pro plugin through 1.7.1 for WordPress has PHP code execution by uploading a .php file within a ZIP archive. | |||||
CVE-2015-5151 | 1 Themepunch | 1 Slider Revolution | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in the Slider Revolution (revslider) plugin 4.2.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the client_action parameter in a revslider_ajax_action action to wp-admin/admin-ajax.php. | |||||
CVE-2014-9735 | 1 Themepunch | 2 Showbiz Pro, Slider Revolution | 2024-11-21 | 7.5 HIGH | N/A |
The ThemePunch Slider Revolution (revslider) plugin before 3.0.96 for WordPress and Showbiz Pro plugin 1.7.1 and earlier for Wordpress does not properly restrict access to administrator AJAX functionality, which allows remote attackers to (1) upload and execute arbitrary files via an update_plugin action; (2) delete arbitrary sliders via a delete_slider action; and (3) create, (4) update, (5) import, or (6) export arbitrary sliders via unspecified vectors. | |||||
CVE-2014-9734 | 1 Themepunch | 1 Slider Revolution | 2024-11-21 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the Slider Revolution (revslider) plugin before 4.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php. | |||||
CVE-2024-8107 | 1 Themepunch | 1 Slider Revolution | 2024-11-13 | N/A | 5.4 MEDIUM |
The Slider Revolution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to use and configure Slider Revolution can be extended to authors. |