Filtered by vendor Presstigers
Subscriptions
Filtered by product Simple Job Board
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-52122 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | 4.3 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Job Board.This issue affects Simple Job Board: from n/a through 2.10.6. | ||||
CVE-2023-29440 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | 8.8 High |
Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Job Board plugin <= 2.10.3 versions. | ||||
CVE-2022-2558 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | 5.3 Medium |
The Simple Job Board WordPress plugin before 2.10.0 is susceptible to Directory Listing which allows the public listing of uploaded resumes in certain configurations. | ||||
CVE-2021-39328 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | 5.5 Medium |
The Simple Job Board WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping on the $job_board_privacy_policy_label variable echo'd out via the ~/admin/settings/class-simple-job-board-settings-privacy.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.9.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | ||||
CVE-2017-18498 | 1 Presstigers | 1 Simple Job Board | 2024-11-21 | N/A |
The simple-job-board plugin before 2.4.4 for WordPress has reflected XSS via keyword search. | ||||
CVE-2024-7351 | 1 Presstigers | 1 Simple Job Board | 2024-09-27 | 7.2 High |
The Simple Job Board plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.12.3 via deserialization of untrusted input when editing job applications. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. |
Page 1 of 1.