Wordpress Multiple Third Party Plugins Vulnerabilities
Description
(#Several vulnerabilities have been identified in third-party plugins for WordPress:#- event-registration: SQL injections in the "evt_public-process_confirmation.php" source file and exploitable via the "token" and "questions" POST parameters##- event-registration: stored cross-site scripting in attendee's first name and last name fields on registration confirmation (evr_public-process_confirmation.php)##- nelio-ab-testing: path traversal##- enhanced-tooltipglossary: reflected cross-site scripting in the "itemsnumber" GET parameter of the "enhanced-tooltipglossary/backend/views/admin_importexport.php" page##- tera-charts: reflected cross-site scripting in the "fn" and "userid" GET parameters of the "tera-charts/charts/treemap.php" page##- pondol-carousel: reflected cross-site scripting in the "itemid" GET parameter of the "pondol-carousel/pages/admin_create.php" page##- Simple Photo Gallery: stored cross-site scripting in the "name" field of galleries and albums##- Fluid Responsive Slideshow: cross-site request forgery in the "frst_save()" AJAX handler##- Fluid Responsive Slideshow: reflected cross-site scripting in the "skin" GET parameter.##Proofs of concept are available.)