Количество 5
Количество 5

CVE-2023-5561
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack

CVE-2023-5561
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
CVE-2023-5561
WordPress does not properly restrict which user fields are searchable ...
GHSA-x7w6-3cp2-qjcv
The Popup Builder WordPress plugin through 4.1.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

BDU:2023-08227
Уязвимость реализации прикладного программного интерфейса системы управления содержимым сайта WordPress, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-5561 WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack | CVSS3: 5.3 | 58% Средний | почти 2 года назад |
![]() | CVE-2023-5561 WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack | CVSS3: 5.3 | 58% Средний | почти 2 года назад |
CVE-2023-5561 WordPress does not properly restrict which user fields are searchable ... | CVSS3: 5.3 | 58% Средний | почти 2 года назад | |
GHSA-x7w6-3cp2-qjcv The Popup Builder WordPress plugin through 4.1.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | CVSS3: 5.3 | 58% Средний | почти 2 года назад | |
![]() | BDU:2023-08227 Уязвимость реализации прикладного программного интерфейса системы управления содержимым сайта WordPress, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.3 | 58% Средний | почти 2 года назад |
Уязвимостей на страницу