Логотип exploitDog
bind:CVE-2023-5653
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-5653

Количество 2

Количество 2

nvd логотип

CVE-2023-5653

около 2 лет назад

The WassUp Real Time Analytics WordPress plugin through 1.9.4.5 does not escape IP address provided via some headers before outputting them back in an admin page, allowing unauthenticated users to perform Stored XSS attacks against logged in admins

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-4q47-vc82-p724

около 2 лет назад

The WassUp Real Time Analytics WordPress plugin through 1.9.4.5 does not escape IP address provided via some headers before outputting them back in an admin page, allowing unauthenticated users to perform Stored XSS attacks against logged in admins

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-5653

The WassUp Real Time Analytics WordPress plugin through 1.9.4.5 does not escape IP address provided via some headers before outputting them back in an admin page, allowing unauthenticated users to perform Stored XSS attacks against logged in admins

CVSS3: 6.1
1%
Низкий
около 2 лет назад
github логотип
GHSA-4q47-vc82-p724

The WassUp Real Time Analytics WordPress plugin through 1.9.4.5 does not escape IP address provided via some headers before outputting them back in an admin page, allowing unauthenticated users to perform Stored XSS attacks against logged in admins

CVSS3: 6.1
1%
Низкий
около 2 лет назад

Уязвимостей на страницу