| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| The add-from-server plugin before 3.3.2 for WordPress has CSRF for importing a large file. |
| The GoDaddy godaddy-email-marketing-sign-up-forms plugin before 1.1.3 for WordPress has CSRF. |
| The wp-customer-reviews plugin before 3.0.9 for WordPress has CSRF in the admin tools. |
| The wp-editor plugin before 1.2.6 for WordPress has CSRF. |
| The simple-membership plugin before 3.3.3 for WordPress has multiple CSRF issues. |
| The simple-add-pages-or-posts plugin before 1.7 for WordPress has CSRF for deleting users. |
| The google-document-embedder plugin before 2.6.2 for WordPress has CSRF. |
| The wp-database-backup plugin before 4.3.1 for WordPress has CSRF. |
| The wp-database-backup plugin before 4.3.3 for WordPress has CSRF. |
| The Lightbox Plus Colorbox plugin through 2.7.2 for WordPress has cross-site request forgery (CSRF) via wp-admin/admin.php?page=lightboxplus, as demonstrated by resultant width XSS. |
| Edimax Wi-Fi Extender devices allow goform/formwlencryptvxd CSRF with resultant PSK key disclosure. |
| Neet AirStream NAS1.1 devices have a password of ifconfig for the root account. This cannot be changed via the configuration page. |
| Neet AirStream NAS1.1 devices allow CSRF attacks that cause the settings binary to change the AP name and password. |
| cPanel before 55.9999.141 allows account-suspension bypass via ftp (SEC-105). |
| cPanel before 55.9999.141 allows attackers to bypass a Security Policy by faking static documents (SEC-92). |
| edx-platform before 2016-06-06 allows CSRF. |
| In Redaxo 5.2.0, the cron management of the admin panel suffers from CSRF that leads to arbitrary Remote Code Execution via addons/cronjob/lib/types/phpcode.php. |
| Kliqqi 3.0.0.5 allows CSRF with resultant Arbitrary File Upload because module.php?module=upload can be used to configure the uploading of .php files, and then modules/upload/upload_main.php can be used for the upload itself. |
| Zenbership v107 has CSRF via admin/cp-functions/event-add.php. |
| Droppy versions <3.5.0 does not perform any verification for cross-domain websocket requests. An attacker is able to make a specially crafted page that can send requests as the context of the currently logged in user. For example this means the malicious user could add a new admin account under his control and delete others. |