CVE-2021-34659: Plugmatter Pricing Table Lite Plugin up to 1.0.32 on WordPress Parameter ~/license.php email cross site scripting

Overview

A vulnerability was found in Plugmatter Pricing Table Lite Plugin up to 1.0.32 on WordPress (WordPress Plugin) and classified as problematic. Affected by this issue is an unknown function of the file ~/license.php of the component Parameter Handler. Applying a patch is able to eliminate this problem. The bugfix is ready for download at plugins.trac.wordpress.org.

CVE-ID

CVE-2021-34659

Risk Score 6.1
Severity rating: MEDIUM
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Exploiting Class: Cross site scripting
Remote: Yes

Affected Product:

Type: WordPress Plugin

Name: Plugmatter Pricing Table Lite Plugin

Basic Matrices

Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope:  Changed
Confidentiality Impact:  Low
Integrity Impact: Low
Availability Impact: None
CWE CWE-79

Mitigation

Applying a patch is able to eliminate this problem. The bugfix is ready for download at plugins.trac.wordpress.org.

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2022-45884 : LINUX KERNEL UP TO 6.0.9 DVBDEV.C DVB_REGISTER_DEVICE USE AFTER FREE

CVE-2022-45884 : LINUX KERNEL UP TO 6.0.9 DVBDEV.C DVB_REGISTER_DEVICE USE AFTER FREE

Description An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating

CVE-2022-41875 : OPTICA UP TO 0.10.1 JSON OJ.SAFE_LOAD DESERIALIZATION

CVE-2022-41875 : OPTICA UP TO 0.10.1 JSON OJ.SAFE_LOAD DESERIALIZATION

Description A remote code execution (RCE) vulnerability in Optica allows unauthenticated attackers to execute arbitrary code via specially crafted JSON

CVE-2022-3910 : LINUX KERNEL LOCAL PRIVILEGE IO_URING USE AFTER FREE

CVE-2022-3910 : LINUX KERNEL LOCAL PRIVILEGE IO_URING USE AFTER FREE

Description Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads