Vulnerabilites related to bytesforall - Atahualpa
Vulnerability from fkie_nvd
Published
2011-09-28 10:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Atahualpa theme before 3.6.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bytesforall | atahualpa | * | |
bytesforall | atahualpa | 2.0 | |
bytesforall | atahualpa | 2.01 | |
bytesforall | atahualpa | 2.2 | |
bytesforall | atahualpa | 2.21 | |
bytesforall | atahualpa | 3.1 | |
bytesforall | atahualpa | 3.1.1 | |
bytesforall | atahualpa | 3.1.2 | |
bytesforall | atahualpa | 3.1.3 | |
bytesforall | atahualpa | 3.1.4 | |
bytesforall | atahualpa | 3.1.5 | |
bytesforall | atahualpa | 3.1.6 | |
bytesforall | atahualpa | 3.1.8 | |
bytesforall | atahualpa | 3.1.9 | |
bytesforall | atahualpa | 3.2 | |
bytesforall | atahualpa | 3.4 | |
bytesforall | atahualpa | 3.4.1 | |
bytesforall | atahualpa | 3.4.01 | |
bytesforall | atahualpa | 3.4.3 | |
bytesforall | atahualpa | 3.4.4 | |
bytesforall | atahualpa | 3.4.5 | |
bytesforall | atahualpa | 3.4.6 | |
bytesforall | atahualpa | 3.4.9 | |
bytesforall | atahualpa | 3.5.2 | |
bytesforall | atahualpa | 3.5.4 | |
bytesforall | atahualpa | 3.6 | |
bytesforall | atahualpa | 3.6.1 | |
bytesforall | atahualpa | 3.6.2 | |
bytesforall | atahualpa | 3.6.3 | |
bytesforall | atahualpa | 3.6.4 | |
bytesforall | atahualpa | 3.6.6 | |
wordpress | wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bytesforall:atahualpa:*:*:*:*:*:*:*:*", "matchCriteriaId": "488B9614-9FC5-4CFF-AEC2-4355BBEF4F64", "versionEndIncluding": "3.6.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FDD9C54-F366-49F2-A878-548961B26497", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "CC3F95B8-9B22-424E-BE99-FCD12798A8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A96E0B2F-AE23-4EAE-A996-33D1A35FE2CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:2.21:*:*:*:*:*:*:*", "matchCriteriaId": "2514E232-9F82-4CD4-988D-C4D568F1BBAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "63689ACF-F72F-466F-AA9A-59504F3AE3F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "08EABA3E-BEF6-41FA-A97A-418A88918F9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4A6F42A-A8F8-444C-BBFD-79F2BC39E6A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "24FF4D07-2B1E-41DB-9CF8-BA2154BF4B4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5660F954-07B6-437C-AE28-A6B36FF967BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2FC88F03-FD6E-4C10-B0EF-604DCC7C33D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "22F0549C-A1AC-41FD-B25E-87E396C3E63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "F499BF53-9E42-486D-9B8B-33B9C9615A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "A1E4D178-E105-4AD0-98F6-44AF92835C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A5F42DF2-3DA5-4BD6-B42B-156DDD4F2307", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA6E4661-9CF9-42FD-93A2-0BE78F09C2CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "824A69F6-C4F0-4D20-905B-39941506116D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.4.01:*:*:*:*:*:*:*", "matchCriteriaId": "6D8C9AA7-38A6-425C-A802-0B1A804020CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "D1F84B47-7F55-4D89-B03C-10A5B14A6DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA51228D-0F10-438F-A2EC-0B6A9C9563CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "EEC6615B-928B-43D4-AB86-52D28405A744", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "CABF03DD-992D-4D34-A552-D481410BC975", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "EEDE02FD-A310-4B81-8D0F-66F6C4FF987D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "856780F1-54A8-4F58-92B0-970CCA7E7D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A616072D-BE97-4D37-BCC8-DAF28F8FB572", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "A6587B52-DF5A-4F74-B489-99B8081A8B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2D9781-C0F6-4AC4-833A-767C1A709A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "61B496F7-1237-4AF6-A330-6E17BC4C3D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "C393F16A-6BBD-43CF-844C-2ABB7A5C704C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "A0F500F4-C1A1-4DFA-8A41-DE0E1C6106F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bytesforall:atahualpa:3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "38E6C2BF-4A45-429F-BEB8-74510EF4E42B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Atahualpa theme before 3.6.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter." }, { "lang": "es", "value": "vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el tema Atahualpa anteriores a v3.6.8 para WordPress, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro s." } ], "id": "CVE-2011-3850", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-09-28T10:55:03.343", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/46297" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "URL Repurposed" ], "url": "https://sitewat.ch/en/Advisories/8" }, { "source": "cve@mitre.org", "url": "https://wpvulndb.com/vulnerabilities/9788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "URL Repurposed" ], "url": "https://sitewat.ch/en/Advisories/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://wpvulndb.com/vulnerabilities/9788" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-23 05:15
Modified
2024-11-21 03:22
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Summary
A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely.
References
▼ | URL | Tags | |
---|---|---|---|
cna@vuldb.com | http://seclists.org/fulldisclosure/2017/Feb/90 | Exploit, Mailing List, Third Party Advisory | |
cna@vuldb.com | https://vuldb.com/?id.97380 | Permissions Required, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2017/Feb/90 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?id.97380 | Permissions Required, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bytesforall | atahualpa | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bytesforall:atahualpa:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "64FEE798-FCAE-4175-B718-8902EE3B01F4", "versionEndIncluding": "3.7.24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Atahualpa Theme. Est\u00e1 afectada una funci\u00f3n desconocida. La manipulaci\u00f3n conduce a un ataque de tipo cross-site request forgery. Es posible lanzar el ataque de forma remota" } ], "id": "CVE-2017-20088", "lastModified": "2024-11-21T03:22:36.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-23T05:15:07.710", "references": [ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/90" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.97380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/90" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.97380" } ], "sourceIdentifier": "cna@vuldb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "cna@vuldb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-23 05:15
Modified
2024-11-21 03:22
Severity ?
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability has been found in Atahualpa Theme and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely.
References
▼ | URL | Tags | |
---|---|---|---|
cna@vuldb.com | http://seclists.org/fulldisclosure/2017/Feb/83 | Exploit, Mailing List, Third Party Advisory | |
cna@vuldb.com | https://vuldb.com/?id.97375 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2017/Feb/83 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?id.97375 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bytesforall | atahualpa | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bytesforall:atahualpa:-:*:*:*:*:wordpress:*:*", "matchCriteriaId": "B97AB149-A9AA-48CB-92CE-C058B10D95B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Atahualpa Theme and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad en Atahualpa Theme y ha sido clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida. La manipulaci\u00f3n conduce a un ataque de tipo cross site scripting b\u00e1sico. El ataque puede ser lanzado remotamente" } ], "id": "CVE-2017-20085", "lastModified": "2024-11-21T03:22:36.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-23T05:15:07.037", "references": [ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/83" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.97375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.97375" } ], "sourceIdentifier": "cna@vuldb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-80" } ], "source": "cna@vuldb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-28 19:15
Modified
2025-02-14 15:29
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Cross-Site Request Forgery (CSRF) vulnerability in bytesforall Atahualpa.This issue affects Atahualpa: from n/a through 3.7.24.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bytesforall | atahualpa | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bytesforall:atahualpa:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "64FEE798-FCAE-4175-B718-8902EE3B01F4", "versionEndIncluding": "3.7.24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in bytesforall Atahualpa.This issue affects Atahualpa: from n/a through 3.7.24.\n\n" }, { "lang": "es", "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en bytes para todo Atahualpa. Este problema afecta a Atahualpa: desde n/a hasta 3.7.24." } ], "id": "CVE-2024-27948", "lastModified": "2025-02-14T15:29:28.163", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "audit@patchstack.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-28T19:15:11.357", "references": [ { "source": "audit@patchstack.com", "tags": [ "Third Party Advisory" ], "url": "https://patchstack.com/database/vulnerability/atahualpa/wordpress-atahualpa-theme-3-7-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://patchstack.com/database/vulnerability/atahualpa/wordpress-atahualpa-theme-3-7-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" } ], "sourceIdentifier": "audit@patchstack.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "audit@patchstack.com", "type": "Primary" } ] }
CVE-2017-20085 (GCVE-0-2017-20085)
Vulnerability from cvelistv5
Published
2022-06-23 04:20
Modified
2025-04-15 14:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-80 - Basic Cross Site Scripting
Summary
A vulnerability has been found in Atahualpa Theme and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2017/Feb/83 | x_refsource_MISC | |
https://vuldb.com/?id.97375 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
unspecified | Atahualpa Theme |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:45:25.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/83" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.97375" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-20085", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T17:08:55.240056Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T14:15:11.688Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Atahualpa Theme", "vendor": "unspecified", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Spyros Gasteratos" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Atahualpa Theme and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80 Basic Cross Site Scripting", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-23T04:20:22.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/83" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.97375" } ], "title": "Atahualpa Theme cross site scriting", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2017-20085", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "Atahualpa Theme cross site scriting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Atahualpa Theme", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "" } ] } }, "credit": "Spyros Gasteratos", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been found in Atahualpa Theme and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "3.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-80 Basic Cross Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "http://seclists.org/fulldisclosure/2017/Feb/83", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/Feb/83" }, { "name": "https://vuldb.com/?id.97375", "refsource": "MISC", "url": "https://vuldb.com/?id.97375" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2017-20085", "datePublished": "2022-06-23T04:20:23.000Z", "dateReserved": "2022-06-19T00:00:00.000Z", "dateUpdated": "2025-04-15T14:15:11.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-3850 (GCVE-0-2011-3850)
Vulnerability from cvelistv5
Published
2011-09-28 10:00
Modified
2024-08-06 23:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in the Atahualpa theme before 3.6.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/46297 | third-party-advisory, x_refsource_SECUNIA | |
https://sitewat.ch/en/Advisories/8 | x_refsource_MISC | |
https://wpvulndb.com/vulnerabilities/9788 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:46:03.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46297", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46297" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sitewat.ch/en/Advisories/8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpvulndb.com/vulnerabilities/9788" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Atahualpa theme before 3.6.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-19T04:06:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46297", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46297" }, { "tags": [ "x_refsource_MISC" ], "url": "https://sitewat.ch/en/Advisories/8" }, { "tags": [ "x_refsource_MISC" ], "url": "https://wpvulndb.com/vulnerabilities/9788" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3850", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Atahualpa theme before 3.6.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46297", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46297" }, { "name": "https://sitewat.ch/en/Advisories/8", "refsource": "MISC", "url": "https://sitewat.ch/en/Advisories/8" }, { "name": "https://wpvulndb.com/vulnerabilities/9788", "refsource": "MISC", "url": "https://wpvulndb.com/vulnerabilities/9788" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3850", "datePublished": "2011-09-28T10:00:00", "dateReserved": "2011-09-27T00:00:00", "dateUpdated": "2024-08-06T23:46:03.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-20088 (GCVE-0-2017-20088)
Vulnerability from cvelistv5
Published
2022-06-23 04:20
Modified
2025-04-15 14:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery
Summary
A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2017/Feb/90 | x_refsource_MISC | |
https://vuldb.com/?id.97380 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
unspecified | Atahualpa Theme |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:45:25.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/90" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.97380" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-20088", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T17:08:45.425552Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T14:14:34.974Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Atahualpa Theme", "vendor": "unspecified", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Spyros Gasteratos" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-23T04:20:27.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/90" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.97380" } ], "title": "Atahualpa Theme cross-site request forgery", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2017-20088", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "Atahualpa Theme cross-site request forgery" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Atahualpa Theme", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "" } ] } }, "credit": "Spyros Gasteratos", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "4.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery" } ] } ] }, "references": { "reference_data": [ { "name": "http://seclists.org/fulldisclosure/2017/Feb/90", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/Feb/90" }, { "name": "https://vuldb.com/?id.97380", "refsource": "MISC", "url": "https://vuldb.com/?id.97380" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2017-20088", "datePublished": "2022-06-23T04:20:27.000Z", "dateReserved": "2022-06-19T00:00:00.000Z", "dateUpdated": "2025-04-15T14:14:34.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-27948 (GCVE-0-2024-27948)
Vulnerability from cvelistv5
Published
2024-02-28 18:17
Modified
2024-08-23 20:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
Cross-Site Request Forgery (CSRF) vulnerability in bytesforall Atahualpa.This issue affects Atahualpa: from n/a through 3.7.24.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
bytesforall | Atahualpa |
Version: n/a < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://patchstack.com/database/vulnerability/atahualpa/wordpress-atahualpa-theme-3-7-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-27948", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-23T20:00:49.174729Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-23T20:00:58.473Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/themes/", "defaultStatus": "unaffected", "packageName": "atahualpa", "product": "Atahualpa", "vendor": "bytesforall", "versions": [ { "lessThanOrEqual": "3.7.24", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Mika (Patchstack Alliance)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-Site Request Forgery (CSRF) vulnerability in bytesforall Atahualpa.\u003cp\u003eThis issue affects Atahualpa: from n/a through 3.7.24.\u003c/p\u003e" } ], "value": "Cross-Site Request Forgery (CSRF) vulnerability in bytesforall Atahualpa.This issue affects Atahualpa: from n/a through 3.7.24.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-28T18:17:48.741Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/vulnerability/atahualpa/wordpress-atahualpa-theme-3-7-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress Atahualpa Theme \u003c= 3.7.24 is vulnerable to Cross Site Request Forgery (CSRF)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2024-27948", "datePublished": "2024-02-28T18:17:17.495Z", "dateReserved": "2024-02-28T16:45:36.407Z", "dateUpdated": "2024-08-23T20:00:58.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }