Vulnerabilities > Codeastrology
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-06 | CVE-2024-37554 | Cross-site Scripting vulnerability in Codeastrology Ultraaddons Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeAstrology Team UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode).This issue affects UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode): from n/a through 1.1.6. | 5.4 |
2023-12-18 | CVE-2023-49153 | Cross-Site Request Forgery (CSRF) vulnerability in Codeastrology ADD to Cart Text Changer and Customize Button, ADD Custom Icon Cross-Site Request Forgery (CSRF) vulnerability in Saiful Islam Add to Cart Text Changer and Customize Button, Add Custom Icon.This issue affects Add to Cart Text Changer and Customize Button, Add Custom Icon: from n/a through 2.0. | 8.8 |
2023-12-18 | CVE-2023-48768 | Cross-Site Request Forgery (CSRF) vulnerability in Codeastrology Quantity Plus Minus Button for Woocommerce Cross-Site Request Forgery (CSRF) vulnerability in CodeAstrology Team Quantity Plus Minus Button for WooCommerce by CodeAstrology.This issue affects Quantity Plus Minus Button for WooCommerce by CodeAstrology: from n/a through 1.1.9. | 8.8 |
2023-09-11 | CVE-2023-4270 | Unspecified vulnerability in Codeastrology MIN MAX Control The Min Max Control WordPress plugin before 4.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | 6.1 |
2022-04-18 | CVE-2022-1020 | Unspecified vulnerability in Codeastrology WOO Product Table The Product Table for WooCommerce (wooproducttable) WordPress plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument | 9.8 |