Логотип exploitDog
bind:CVE-2018-1000813
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1000813

Количество 3

Количество 3

nvd логотип

CVE-2018-1000813

около 7 лет назад

Backdrop CMS version 1.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Sanitization of custom class names used on blocks and layouts. that can result in Execution of JavaScript from an unexpected source.. This attack appear to be exploitable via A user must be directed to an affected page while logged in.. This vulnerability appears to have been fixed in 1.11.1 and later.

CVSS3: 4.8
EPSS: Низкий
debian логотип

CVE-2018-1000813

около 7 лет назад

Backdrop CMS version 1.11.0 and earlier contains a Cross Site Scriptin ...

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-8wm7-hhmh-8mwj

больше 3 лет назад

Backdrop CMS version 1.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Sanitization of custom class names used on blocks and layouts. that can result in Execution of JavaScript from an unexpected source.. This attack appear to be exploitable via A user must be directed to an affected page while logged in.. This vulnerability appears to have been fixed in 1.11.1 and later.

CVSS3: 4.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-1000813

Backdrop CMS version 1.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Sanitization of custom class names used on blocks and layouts. that can result in Execution of JavaScript from an unexpected source.. This attack appear to be exploitable via A user must be directed to an affected page while logged in.. This vulnerability appears to have been fixed in 1.11.1 and later.

CVSS3: 4.8
0%
Низкий
около 7 лет назад
debian логотип
CVE-2018-1000813

Backdrop CMS version 1.11.0 and earlier contains a Cross Site Scriptin ...

CVSS3: 4.8
0%
Низкий
около 7 лет назад
github логотип
GHSA-8wm7-hhmh-8mwj

Backdrop CMS version 1.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Sanitization of custom class names used on blocks and layouts. that can result in Execution of JavaScript from an unexpected source.. This attack appear to be exploitable via A user must be directed to an affected page while logged in.. This vulnerability appears to have been fixed in 1.11.1 and later.

CVSS3: 4.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу