Reflected XSS in wordpress plugin ajax-random-post v2.00
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93895 | |
http://www.vapidlabs.com/wp/wp_advisory.php?v=494 | Exploit Third Party Advisory |
https://wordpress.org/plugins/ajax-random-post | Not Applicable |
http://www.securityfocus.com/bid/93895 | |
http://www.vapidlabs.com/wp/wp_advisory.php?v=494 | Exploit Third Party Advisory |
https://wordpress.org/plugins/ajax-random-post | Not Applicable |
Configurations
History
21 Nov 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93895 - | |
References | () http://www.vapidlabs.com/wp/wp_advisory.php?v=494 - Exploit, Third Party Advisory | |
References | () https://wordpress.org/plugins/ajax-random-post - Not Applicable |
Information
Published : 2016-10-10 20:59
Updated : 2024-11-21 02:42
NVD link : CVE-2016-1000127
Mitre link : CVE-2016-1000127
CVE.ORG link : CVE-2016-1000127
JSON object : View
Products Affected
ajax-random-post_project
- ajax-random-post
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')