Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Unknown | Simply Schedule Appointments – WordPress Booking Plugin | 1.5.7.7 ~ 1.5.7.7 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WordPress Simply Schedule Appointments plugin before 1.5.7.7 is susceptible to information disclosure. The plugin is missing authorization in a REST endpoint, which can allow an attacker to retrieve user details such as name and email address. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-2373.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-1123 | Leaflet Maps Marker < 3.12.5 - Admin+ SQLi | |
| CVE-2022-1663 | Stop Spam Comments <= 0.2.1.2 - Access Token Bypass | |
| CVE-2022-2034 | Sensei LMS < 4.5.0 - Unauthenticated Private Messages Disclosure via Rest API | |
| CVE-2022-2080 | Sensei LMS < 4.5.2 - Arbitrary Private Message Sending via IDOR | |
| CVE-2022-2261 | WPide < 3.0 - Admin+ Local File Inclusion | |
| CVE-2022-2267 | MailChimp for Woocommerce < 2.7.1 - Subscriber+ SSRF | |
| CVE-2022-2374 | Simply Schedule Appointments < 1.5.7.7 - Admin+ Stored Cross-Site Scripting | |
| CVE-2022-2537 | WooCommerce PDF Invoices & Packing Slips < 3.0.1 - Reflected Cross-Site Scripting | |
| CVE-2022-2538 | WP Hide & Security Enhancer < 1.8 - Reflected Cross-Site Scripting | |
| CVE-2022-2556 | MailChimp for Woocommerce < 2.7.2 - Admin+ SSRF | |
| CVE-2022-2559 | Fluent Support < 1.5.8 - Admin+ SQLi | |
| CVE-2022-2599 | Anti-Malware Security and Brute-Force Firewall < 4.21.83 - Reflected Cross-Site Scripting | |
| CVE-2022-2638 | Export All URLs < 4.4 - Admin+ Arbitrary System File Removal |
No comments yet