cvelist/2024/2xxx/CVE-2024-2761.json

80 lines
2.3 KiB
JSON
Raw Normal View History

2024-04-02 14:13:38 +00:00
{
2024-04-19 05:00:31 +00:00
"data_version": "4.0",
2024-04-02 14:13:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-2761",
2024-04-19 05:00:31 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2024-04-02 14:13:38 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-19 05:00:31 +00:00
"value": "The Genesis Blocks WordPress plugin before 3.1.3 does not properly escape data input provided to some of its blocks, allowing using with at least contributor privileges to conduct Stored XSS attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Genesis Blocks",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "3.1.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/"
2024-04-02 14:13:38 +00:00
}
]
2024-04-19 05:00:31 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Dmitrii Ignatyev"
},
{
"lang": "en",
"value": "WPScan"
}
]
2024-04-02 14:13:38 +00:00
}