Filtered by vendor Kunalnagar Subscriptions
Total 9 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-32740 1 Kunalnagar 1 Custom 404 Pro 2024-09-24 5.8 Medium
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Kunal Nagar Custom 404 Pro plugin <= 3.8.1 versions.
CVE-2024-39646 1 Kunalnagar 1 Custom 404 Pro 2024-09-11 7.1 High
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kunal Nagar Custom 404 Pro allows Reflected XSS.This issue affects Custom 404 Pro: from n/a through 3.11.1.
CVE-2019-15838 1 Kunalnagar 1 Custom 404 Pro 2024-08-05 N/A
The custom-404-pro plugin before 3.2.8 for WordPress has reflected XSS, a different vulnerability than CVE-2019-14789.
CVE-2019-14789 1 Kunalnagar 1 Custom 404 Pro 2024-08-05 N/A
The Custom 404 Pro plugin 3.2.8 for WordPress has XSS via the wp-admin/admin.php?page=c4p-main page parameter.
CVE-2022-47605 1 Kunalnagar 1 Custom 404 Pro 2024-08-03 8.3 High
Auth. SQL Injection') vulnerability in Kunal Nagar Custom 404 Pro plugin <= 3.7.0 versions.
CVE-2023-51540 1 Kunalnagar 1 Custom 404 Pro 2024-08-02 7.1 High
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kunal Nagar Custom 404 Pro allows Stored XSS.This issue affects Custom 404 Pro: from n/a through 3.10.0.
CVE-2023-2032 1 Kunalnagar 1 Custom 404 Pro 2024-08-02 9.8 Critical
The Custom 404 Pro WordPress plugin before 3.8.1 does not properly sanitize database inputs, leading to multiple SQL Injection vulnerabilities.
CVE-2023-2023 1 Kunalnagar 1 Custom 404 Pro 2024-08-02 6.1 Medium
The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting.
CVE-2023-0385 1 Kunalnagar 1 Custom 404 Pro 2024-08-02 4.3 Medium
The Custom 404 Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.7.1. This is due to missing or incorrect nonce validation on the custom_404_pro_admin_init function. This makes it possible for unauthenticated attackers to delete logs, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.