Vulnerabilities (CVE)

Filtered by vendor Tms-outsource Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-50860 1 Tms-outsource 1 Amelia 2024-01-04 N/A 5.4 MEDIUM
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TMS Booking for Appointments and Events Calendar – Amelia allows Stored XSS.This issue affects Booking for Appointments and Events Calendar – Amelia: from n/a through 1.0.85.
CVE-2022-0837 1 Tms-outsource 1 Amelia 2023-08-02 5.5 MEDIUM 5.4 MEDIUM
The Amelia WordPress plugin before 1.0.48 does not have proper authorisation when handling Amelia SMS service, allowing any customer to send paid test SMS notification as well as retrieve sensitive information about the admin, such as the email, account balance and payment history. A malicious actor can abuse this vulnerability to drain out the account balance by keep sending SMS notification.
CVE-2021-24198 1 Tms-outsource 1 Wpdatatables 2022-07-30 5.5 MEDIUM 8.1 HIGH
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 has Improper Access Control. A low privilege authenticated user that visits the page where the table is published can tamper the parameters to delete the data of another user that are present in the same table through id_key and id_val parameters. By exploiting this issue an attacker is able to delete the data of all users in the same table.
CVE-2021-24197 1 Tms-outsource 1 Wpdatatables 2022-07-30 5.5 MEDIUM 8.1 HIGH
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 has Improper Access Control. A low privilege authenticated user that visits the page where the table is published can tamper the parameters to access the data of another user that are present in the same table by taking over the user permissions on the table through formdata[wdt_ID] parameter. By exploiting this issue an attacker is able to access and manage the data of all users in the same table.
CVE-2022-0825 1 Tms-outsource 1 Amelia 2022-06-03 5.5 MEDIUM 5.4 MEDIUM
The Amelia WordPress plugin before 1.0.49 does not have proper authorisation when managing appointments, allowing any customer to update other's booking status, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it.
CVE-2022-29432 1 Tms-outsource 1 Wpdatatables 2022-05-26 3.5 LOW 4.8 MEDIUM
Multiple Authenticated (administrator or higher user role) Persistent Cross-Site Scripting (XSS) vulnerabilities in TMS-Plugins wpDataTables plugin <= 2.1.27 on WordPress via &data-link-text, &data-link-url, &data, &data-shortcode, &data-star-num vulnerable parameters.
CVE-2021-24200 1 Tms-outsource 1 Wpdatatables 2021-04-13 4.0 MEDIUM 6.5 MEDIUM
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'length' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application.
CVE-2021-24199 1 Tms-outsource 1 Wpdatatables 2021-04-13 4.0 MEDIUM 6.5 MEDIUM
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application.
CVE-2019-6011 1 Tms-outsource 1 Wpdatatables Lite 2020-01-07 4.3 MEDIUM 6.1 MEDIUM
Cross-site scripting vulnerability in wpDataTables Lite Version 2.0.11 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2019-6012 1 Tms-outsource 1 Wpdatatables Lite 2020-01-03 6.5 MEDIUM 7.2 HIGH
SQL injection vulnerability in the wpDataTables Lite Version 2.0.11 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors.