Логотип exploitDog
bind:CVE-2022-0680
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-0680

Количество 2

Количество 2

nvd логотип

CVE-2022-0680

почти 4 года назад

The Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-cgx3-ppp7-j9r4

почти 4 года назад

The Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-0680

The Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue

CVSS3: 6.1
1%
Низкий
почти 4 года назад
github логотип
GHSA-cgx3-ppp7-j9r4

The Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue

CVSS3: 6.1
1%
Низкий
почти 4 года назад

Уязвимостей на страницу