WordPress RokBox

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in WordPress RokBox 2.13

    Open

    The WordPress RokBox plugin is vulnerable to Abuse of Functionality in versions 2.13 and lower. This means that people who are not authorised to access the plugin can use its features in a malicious ...

    Read More
  • Denial of Service vulnerability in WordPress RokBox 2.13

    Open

    The WordPress RokBox plugin, versions up to and including 2.13, can be exploited to deny service to users. An unauthenticated attacker can use the 'src' parameter in the 'thumb.php' file to slow the ...

    Read More
  • Input validation vulnerability in WordPress RokBox 2.13

    Open

    The WordPress RokBox plugin is a tool used to display media on websites. However, in versions up to and including 2.13, it has a vulnerability which allows attackers to inject malicious scripts into ...

    Read More
  • Access violation vulnerability in WordPress RokBox 2.13

    Open

    The WordPress RokBox plugin is not secure in versions up to 2.13. Attackers who are not authorized users can find out the names and locations of certain files which should be kept hidden.

    Read More
  • Access violation vulnerability in WordPress RokBox 2.13

    Open

    The WordPress RokBox plugin is vulnerable to a security issue in which sensitive data can be exposed. This issue affects versions up to and including 2.13. An unauthenticated attacker can gain access...

    Read More
  • Input validation vulnerability in WordPress RokBox 2.13

    Open

    The WordPress RokBox plugin, used in versions up to and including 2.13, is vulnerable to Content Spoofing. This means that unauthenticated attackers can make it look like a file is coming from anothe...

    Read More
  • Input validation vulnerability in WordPress RokBox 2.13

    Open

    The WordPress RokBox plugin, used up to and including version 2.13, could allow attackers to upload files to a website's server without authentication. This could potentially lead to malicious code b...

    Read More