From eacbdef17783ccee5536fa72bdacc9168441f7e2 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Wed, 4 May 2022 12:34:13 -0400 Subject: [PATCH] Enhancement: cves/2019/CVE-2019-6112.yaml by mp --- cves/2019/CVE-2019-6112.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-6112.yaml b/cves/2019/CVE-2019-6112.yaml index 408018025d..4e8ab33741 100644 --- a/cves/2019/CVE-2019-6112.yaml +++ b/cves/2019/CVE-2019-6112.yaml @@ -4,7 +4,7 @@ info: name: WordPress Sell Media 2.4.1 - Cross-Site Scripting author: dwisiswant0 severity: medium - description: "WordPress Plugin Sell Media v2.4.1 contains a cross-site scripting vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 that allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field)." + description: "WordPress Plugin Sell Media v2.4.1 contains a cross-site scripting vulnerability in /inc/class-search.php that allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field)." reference: - https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b - https://nvd.nist.gov/vuln/detail/CVE-2019-6112