Wpsymposiumpro

Wp Symposium

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 77.23%
  • Published 13.01.2015 11:59:28
  • Last modified 12.04.2025 10:46:40

Unrestricted file upload vulnerability in UploadHandler.php in the WP Symposium plugin 14.11 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to t...

Exploit
  • EPSS 3.37%
  • Published 24.12.2014 18:59:05
  • Last modified 12.04.2025 10:46:40

SQL injection vulnerability in ajax/mail_functions.php in the WP Symposium plugin before 14.11 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the tray parameter in a getMailMessage action.

Exploit
  • EPSS 0.36%
  • Published 24.12.2014 18:59:03
  • Last modified 12.04.2025 10:46:40

Multiple cross-site scripting (XSS) vulnerabilities in the WP Symposium plugin before 14.11 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter in an addComment action to ajax/profile_functions.php, ...

  • EPSS 0.35%
  • Published 28.03.2014 15:55:08
  • Last modified 12.04.2025 10:46:40

Open redirect vulnerability in invite.php in the WP Symposium plugin 13.04 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the u parameter.

  • EPSS 0.27%
  • Published 28.03.2014 15:55:08
  • Last modified 12.04.2025 10:46:40

Cross-site scripting (XSS) vulnerability in invite.php in the WP Symposium plugin before 13.04 for WordPress allows remote attackers to inject arbitrary web script or HTML via the u parameter.

  • EPSS 0.47%
  • Published 27.12.2011 11:55:07
  • Last modified 11.04.2025 00:51:21

Cross-site scripting (XSS) vulnerability in uploadify/get_profile_avatar.php in the WP Symposium plugin before 11.12.08 for WordPress allows remote attackers to inject arbitrary web script or HTML via the uid parameter.