Reflected XSS in wordpress plugin ajax-random-post v2.00
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/93895 | |
| http://www.vapidlabs.com/wp/wp_advisory.php?v=494 | Exploit Third Party Advisory |
| https://wordpress.org/plugins/ajax-random-post | Not Applicable |
| http://www.securityfocus.com/bid/93895 | |
| http://www.vapidlabs.com/wp/wp_advisory.php?v=494 | Exploit Third Party Advisory |
| https://wordpress.org/plugins/ajax-random-post | Not Applicable |
Configurations
History
21 Nov 2024, 02:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securityfocus.com/bid/93895 - | |
| References | () http://www.vapidlabs.com/wp/wp_advisory.php?v=494 - Exploit, Third Party Advisory | |
| References | () https://wordpress.org/plugins/ajax-random-post - Not Applicable |
Information
Published : 2016-10-10 20:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-1000127
Mitre link : CVE-2016-1000127
CVE.ORG link : CVE-2016-1000127
JSON object : View
Products Affected
ajax-random-post_project
- ajax-random-post
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
