Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pay project pay vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2023-30614
Pay is a payments engine for Ruby on Rails 6.0 and higher. In versions before 6.3.2 a payments info page of Pay is susceptible to reflected Cross-site scripting. An attacker could create a working URL that renders a javascript link to a user on a Rails application that integrates...
Pay Project Pay
9.8
CVSSv3
CVE-2017-18583
The post-pay-counter plugin prior to 2.731 for WordPress has PHP Object Injection.
Post Pay Counter Project Post Pay Counter
7.5
CVSSv3
CVE-2017-18584
The post-pay-counter plugin prior to 2.731 for WordPress has no permissions check for an update-settinga action.
Post Pay Counter Project Post Pay Counter
9.8
CVSSv3
CVE-2018-15894
A SQL injection exists in /coreframe/app/admin/pay/admin/index.php in WUZHI CMS 4.1.0 via the index.php?m=pay&f=index&v=listing keyValue parameter.
Wuzhi Cms Project Wuzhi Cms 4.1.0
NA
CVE-2014-4543
Multiple cross-site scripting (XSS) vulnerabilities in payper/payper.php in the Pay Per Media Player plugin 1.24 and previous versions for WordPress allow remote malicious users to inject arbitrary web script or HTML via the (1) fcolor, (2) links, (3) stitle, (4) height, (5) widt...
Pay Per Media Player Project Pay Per Media Player
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started