cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-24980,https://securityvulnerability.io/vulnerability/CVE-2021-24980,Gwolle Guestbook < 4.2.0 - Reflected Cross-Site Scripting,"The Gwolle Guestbook WordPress plugin before 4.2.0 does not sanitise and escape the gwolle_gb_user_email parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue in an admin page",Wordpress,Gwolle Guestbook,6.1,MEDIUM,0.0007999999797903001,false,,false,false,false,,false,false,2021-12-27T10:33:23.000Z,0 CVE-2018-17884,https://securityvulnerability.io/vulnerability/CVE-2018-17884,,XSS exists in admin/gb-dashboard-widget.php in the Gwolle Guestbook (gwolle-gb) plugin before 2.5.4 for WordPress via the PATH_INFO to wp-admin/index.php,Wordpress,Gwolle Guestbook,6.1,MEDIUM,0.0023399998899549246,false,,false,false,false,,false,false,2018-10-02T18:00:00.000Z,0 CVE-2015-8351,https://securityvulnerability.io/vulnerability/CVE-2015-8351,,"PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.",Wordpress,Gwolle Guestbook,9,CRITICAL,0.5760400295257568,false,,false,false,true,true,false,false,2017-09-11T20:00:00.000Z,0