Lucene search

K
ExpresstechQuiz And Survey Master

6 matches found

CVE
CVE
added 2021/01/01 4:15 a.m.199 views

CVE-2020-35949

An issue was discovered in the Quiz and Survey Master plugin before 7.0.1 for WordPress. It made it possible for unauthenticated attackers to upload arbitrary files and achieve remote code execution. If a quiz question could be answered by uploading a file, only the Content-Type header was checked ...

10CVSS9.8AI score0.13311EPSS
CVE
CVE
added 2021/01/01 4:15 a.m.85 views

CVE-2020-35951

An issue was discovered in the Quiz and Survey Master plugin before 7.0.1 for WordPress. It allows users to delete arbitrary files such as wp-config.php file, which could effectively take a site offline and allow an attacker to reinstall with a WordPress instance under their control. This occurred ...

9.9CVSS9.3AI score0.55369EPSS
CVE
CVE
added 2021/06/20 1:15 p.m.69 views

CVE-2021-24368

The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin WordPress plugin before 7.1.18 did not sanitise or escape its result_id parameter when displaying an existing quiz result page, leading to a reflected Cross-Site Scripting issue. This could allow for privilege escalation by inducing a l...

6.1CVSS6.2AI score0.0019EPSS
CVE
CVE
added 2021/08/18 6:15 a.m.39 views

CVE-2021-20792

Cross-site scripting vulnerability in Quiz And Survey Master versions prior to 7.1.14 allows a remote attacker to inject arbitrary script via unspecified vectors.

6.1CVSS6AI score0.09715EPSS
CVE
CVE
added 2021/10/11 11:15 a.m.34 views

CVE-2021-24691

The Quiz And Survey Master WordPress plugin before 7.3.2 does not escape the Quiz Url Slug setting before outputting it in some pages, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

4.8CVSS4.7AI score0.00282EPSS
CVE
CVE
added 2021/04/12 2:15 p.m.27 views

CVE-2021-24221

The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin for WordPress plugin before 7.1.12 did not sanitise the result_id GET parameter on pages with the [qsm_result] shortcode without id attribute, concatenating it in a SQL statement and leading to an SQL injection. The lowest role allowed ...

8.8CVSS9.2AI score0.02655EPSS