Логотип exploitDog
bind:CVE-2021-4349
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-4349

Количество 2

Количество 2

nvd логотип

CVE-2021-4349

больше 2 лет назад

The Process Steps Template Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This makes it possible for unauthenticated attackers to conduct unspecified attacks via forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-g64p-mjcm-6hp9

больше 2 лет назад

The Process Steps Template Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This makes it possible for unauthenticated attackers to conduct unspecified attacks via forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-4349

The Process Steps Template Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This makes it possible for unauthenticated attackers to conduct unspecified attacks via forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-g64p-mjcm-6hp9

The Process Steps Template Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This makes it possible for unauthenticated attackers to conduct unspecified attacks via forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу