Filtered by vendor Smartypantsplugins
Subscriptions
Filtered by product Sp Project \& Document Manager
Subscriptions
Total
10 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-36530 | 1 Smartypantsplugins | 1 Sp Project \& Document Manager | 2024-09-25 | 5.9 Medium |
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Smartypants SP Project & Document Manager plugin <= 4.67 versions. | ||||
CVE-2022-34857 | 1 Smartypantsplugins | 1 Sp Project \& Document Manager | 2024-09-16 | 6.1 Medium |
Reflected Cross-Site Scripting (XSS) vulnerability in smartypants SP Project & Document Manager plugin <= 4.59 at WordPress | ||||
CVE-2021-38315 | 1 Smartypantsplugins | 1 Sp Project \& Document Manager | 2024-09-16 | 6.1 Medium |
The SP Project & Document Manager WordPress plugin is vulnerable to attribute-based Reflected Cross-Site Scripting via the from and to parameters in the ~/functions.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.25. | ||||
CVE-2023-36677 | 1 Smartypantsplugins | 1 Sp Project \& Document Manager | 2024-09-05 | 8.8 High |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Smartypants SP Project & Document Manager allows SQL Injection.This issue affects SP Project & Document Manager: from n/a through 4.67. | ||||
CVE-2014-9178 | 1 Smartypantsplugins | 1 Sp Project \& Document Manager | 2024-08-06 | N/A |
Multiple SQL injection vulnerabilities in classes/ajax.php in the Smarty Pants Plugins SP Project & Document Manager plugin (sp-client-document-manager) 2.4.1 and earlier for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) vendor_email[] parameter in the email_vendor function or id parameter in the (2) download_project, (3) download_archive, or (4) remove_cat function. | ||||
CVE-2021-24347 | 1 Smartypantsplugins | 1 Sp Project \& Document Manager | 2024-08-03 | 8.8 High |
The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP". | ||||
CVE-2021-4225 | 2 Microsoft, Smartypantsplugins | 2 Windows, Sp Project \& Document Manager | 2024-08-03 | 8.8 High |
The SP Project & Document Manager WordPress plugin before 4.24 allows any authenticated users, such as subscribers, to upload files. The plugin attempts to prevent PHP and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that on Windows servers, the security checks in place were insufficient, enabling bad actors to potentially upload backdoors on vulnerable sites. | ||||
CVE-2022-1551 | 1 Smartypantsplugins | 1 Sp Project \& Document Manager | 2024-08-03 | 6.5 Medium |
The SP Project & Document Manager WordPress plugin before 4.58 uses an easily guessable path to store user files, bad actors could use that to access other users' sensitive files. | ||||
CVE-2023-3063 | 1 Smartypantsplugins | 1 Sp Project \& Document Manager | 2024-08-02 | 8.8 High |
The SP Project & Document Manager plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 4.67. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with subscriber privileges or above, to change user passwords and potentially take over administrator accounts. | ||||
CVE-2024-37224 | 1 Smartypantsplugins | 1 Sp Project \& Document Manager | 2024-08-02 | 7.5 High |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in smartypants SP Project & Document Manager.This issue affects SP Project & Document Manager: from n/a through 4.71. |
Page 1 of 1.