cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-8981,https://securityvulnerability.io/vulnerability/CVE-2024-8981,: Unauthenticated Attackers Can Inject Arbitrary Web Scripts in Broken Link Checker Plugin for WordPress,The Broken Link Checker plugin for WordPress is susceptible to Reflected Cross-Site Scripting due to inadequate escaping of URLs in the add_query_arg function. This vulnerability exists in all versions prior to and including 2.4.0. Attackers can exploit this flaw to inject arbitrary web scripts into web pages that may be executed if they successfully manipulate a user into clicking on a malicious link. Such exploitation can lead to unauthorized actions on behalf of the user and potential compromise of site integrity.,WPmudev,Broken Link Checker,7.1,HIGH,0.0005200000014156103,false,false,false,false,,false,false,2024-10-01T02:33:30.428Z,0 CVE-2015-10098,https://securityvulnerability.io/vulnerability/CVE-2015-10098,Broken Link Checker Plugin ui_get_action_links cross site scripting,A vulnerability was found in Broken Link Checker Plugin up to 1.10.5 on WordPress. It has been rated as problematic. Affected by this issue is the function print_module_list/show_warnings_section_notice/status_text/ui_get_action_links. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.10.6 is able to address this issue. The name of the patch is f30638869e281461b87548e40b517738b4350e47. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225152.,WPmudev,Broken Link Checker Plugin,3.5,LOW,0.0010400000028312206,false,false,false,false,,false,false,2023-04-08T09:00:06.707Z,0 CVE-2022-2438,https://securityvulnerability.io/vulnerability/CVE-2022-2438,,"The Broken Link Checker plugin for WordPress is vulnerable to deserialization of untrusted input via the '$log_file' value in versions up to, and including 1.11.16. This makes it possible for authenticated attackers with administrative privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.",WPmudev,Broken Link Checker,7.2,HIGH,0.0020000000949949026,false,false,false,false,,false,false,2022-09-06T17:18:57.000Z,0