Enhancement: cves/2021/CVE-2021-45380.yaml by mp
parent
9e84dd3d67
commit
390fe3b65f
|
@ -35,5 +35,3 @@ requests:
|
|||
- "text/html"
|
||||
|
||||
# Enhanced by mp on 2022/01/27
|
||||
|
||||
# Enhanced by mp on 2022/01/27
|
||||
|
|
|
@ -43,6 +43,5 @@ requests:
|
|||
part: interactsh_protocol # Confirms the HTTP Interaction
|
||||
words:
|
||||
- "http"
|
||||
# Enhanced by cs on 2022/02/14
|
||||
|
||||
# Enhanced by cs on 2022/02/16
|
||||
|
|
|
@ -119,5 +119,3 @@ requests:
|
|||
- "System.ArgumentNullException"
|
||||
|
||||
# Enhanced by mp on 2022/02/08
|
||||
|
||||
# Enhanced by mp on 2022/02/27
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
id: CVE-2021-45380
|
||||
|
||||
info:
|
||||
name: AppCMS - Reflected Cross-Site Scripting
|
||||
name: AppCMS - Reflected Cross-Site Scripting
|
||||
author: pikpikcu
|
||||
severity: medium
|
||||
description: AppCMS 2.0.101 has a cross-site scripting vulnerability in \templates\m\inc_head.php
|
||||
description: AppCMS 2.0.101 has a cross-site scripting vulnerability in \templates\m\inc_head.php.
|
||||
reference:
|
||||
- https://github.com/source-trace/appcms/issues/8
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-45380
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: dhiyaneshDk
|
||||
severity: medium
|
||||
description: The plugin was affected by a reflected cross-site scripting vulnerability in the woo_ce admin page.
|
||||
reference:
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/e47c288a-2ea3-4926-93cc-113867cbc77c
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-0149
|
||||
classification:
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2022-0378
|
||||
|
||||
info:
|
||||
name: Microweber Reflected Cross-Site Scripting
|
||||
name: Microweber Reflected Cross-Site Scripting
|
||||
author: pikpikcu
|
||||
severity: medium
|
||||
description: Microweber contains a reflected cross-site scripting in Packagist microweber/microweber prior to 1.2.11.
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Mastodon Prototype Pollution Vulnerability
|
||||
author: pikpikcu
|
||||
severity: medium
|
||||
description: The GitHub repository mastodon/mastodon prior to 3.5.0 contains a Prototype Pollution vulnerability.
|
||||
description: The GitHub repository mastodon/mastodon prior to 3.5.0 contains a Prototype Pollution vulnerability.
|
||||
reference:
|
||||
- https://github.com/mastodon/mastodon/commit/4d6d4b43c6186a13e67b92eaf70fe1b70ea24a09
|
||||
- https://drive.google.com/file/d/1vpZ0CcmFhTEUasLTPUBf8o-4l7G6ojtG/view
|
||||
|
|
|
@ -9,7 +9,7 @@ info:
|
|||
- https://www.wordfence.com/blog/2022/02/reflected-cross-site-scripting-vulnerability-patched-in-wordpress-profile-builder-plugin/
|
||||
tags: cve,cve2022,wordpress,xss,wp-plugin
|
||||
description: "The Profile Builder User Profile & User Registration Forms WordPress plugin is vulnerable to cross-site scripting due to insufficient escaping and sanitization of the site_url parameter found in the ~/assets/misc/fallback-page.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 3.6.1.\n\n."
|
||||
remediation: Upgrade to version 3.6.5 or later.
|
||||
remediation: Upgrade to version 3.6.5 or later.
|
||||
classification:
|
||||
cve-id: CVE-2022-0653
|
||||
|
||||
|
|
Loading…
Reference in New Issue