Adds CVEs

This commit is contained in:
erwanlr 2022-08-08 15:43:17 +02:00
parent 73f9dbc9b5
commit ae1aeb992f
23 changed files with 1629 additions and 338 deletions

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-1323", "ID": "CVE-2022-1323",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Discy < 5.0 - Subscriber+ Broken Access Control to change settings"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Discy",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "5.0",
"version_value": "5.0"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Discy WordPress theme before 5.0 lacks authorization checks then processing ajax requests to the discy_update_options action, allowing any logged in users (with privileges as low as Subscriber,) to change Theme options by sending a crafted POST request."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b",
"name": "https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-284 Improper Access Control",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Veshraj Ghimire"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -3,7 +3,7 @@
"ID": "CVE-2022-1757", "ID": "CVE-2022-1757",
"ASSIGNER": "contact@wpscan.com", "ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Pagebar <= 2.65 - Arbitrary Settings Update via CSRF to Stored XSS" "TITLE": "Pagebar < 2.70 - Arbitrary Settings Update via CSRF to Stored XSS"
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -21,9 +21,9 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<=", "version_affected": "<",
"version_name": "2.65", "version_name": "2.70",
"version_value": "2.65" "version_value": "2.70"
} }
] ]
} }
@ -38,7 +38,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "The Pagebar WordPress plugin through 2.65 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. Furthermore, due to the lack of sanitisation in some of them, it could also lead to Stored XSS issues" "value": "The pagebar WordPress plugin before 2.70 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. Furthermore, due to the lack of sanitisation in some of them, it could also lead to Stored XSS issues"
} }
] ]
}, },
@ -60,6 +60,14 @@
"lang": "eng" "lang": "eng"
} }
] ]
},
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
}
]
} }
] ]
}, },

View File

@ -1,18 +1,80 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2046", "ID": "CVE-2022-2046",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Directorist - Business Directory Plugin < 7.2.3 - Admin+ Arbitrary File Upload"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Directorist WordPress Business Directory Plugin with Classified Ads Listings",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "7.2.3",
"version_value": "7.2.3"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Directorist WordPress plugin before 7.2.3 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from. This could allow administrators to run code on the server, which is a problem in multisite configurations."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807",
"name": "https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807"
},
{
"refsource": "CONFIRM",
"url": "https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1&old=2731298&old_path=%2Fdirectorist",
"name": "https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1&old=2731298&old_path=%2Fdirectorist"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Rafie Muhammad"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2269", "ID": "CVE-2022-2269",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Website File Changes Monitor < 1.8.3 - Admin+ SQLi"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Website File Changes Monitor",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.8.3",
"version_value": "1.8.3"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Website File Changes Monitor WordPress plugin before 1.8.3 does not sanitise and escape user input before using it in a SQL statement via an action available to users with the manage_options capability (by default admins), leading to an SQL injection"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65",
"name": "https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-89 SQL Injection",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Nicolas VIDAL from TEHTRIS"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2355", "ID": "CVE-2022-2355",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Easy Username Updater < 1.0.5 - Arbitrary Username Update via CSRF"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Easy Username Updater",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.0.5",
"version_value": "1.0.5"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Easy Username Updater WordPress plugin before 1.0.5 does not implement CSRF checks, which could allow attackers to make a logged in admin change any user's username includes the admin"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/426b5a0f-c16d-429a-9396-b3aea7922826",
"name": "https://wpscan.com/vulnerability/426b5a0f-c16d-429a-9396-b3aea7922826"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Raad Haddad"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2356", "ID": "CVE-2022-2356",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "User Private Files < 1.1.3 - Subscriber+ Arbitrary File Upload"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Frontend File Manager & Sharing User Private Files",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.1.3",
"version_value": "1.1.3"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Frontend File Manager & Sharing WordPress plugin before 1.1.3 does not filter file extensions when letting users upload files on the server, which may lead to malicious code being uploaded."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43",
"name": "https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Raad Haddad"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2357", "ID": "CVE-2022-2357",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "WSM Downloader <= 1.4.0 - Unauthenticated Arbitrary File Download"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WSM Downloader",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.4.0",
"version_value": "1.4.0"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The WSM Downloader WordPress plugin through 1.4.0 allows any visitor to use its remote file download feature to download any local files, including sensitive ones like wp-config.php."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/42499b84-684e-42e1-b7f0-de206d4da553",
"name": "https://wpscan.com/vulnerability/42499b84-684e-42e1-b7f0-de206d4da553"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-552 Files or Directories Accessible to External Parties",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Raad Haddad"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2367", "ID": "CVE-2022-2367",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "WSM Downloader <= 1.4.0 - Domain Name Restriction Bypass"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WSM Downloader",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.4.0",
"version_value": "1.4.0"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The WSM Downloader WordPress plugin through 1.4.0 allows only specific popular websites to download images/files from, this can be bypassed due to the lack of good \"link\" parameter validation"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/46afb0c6-2d0c-4a20-a9de-48f35ca93f0f",
"name": "https://wpscan.com/vulnerability/46afb0c6-2d0c-4a20-a9de-48f35ca93f0f"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-639 Authorization Bypass Through User-Controlled Key",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Raad Haddad"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2371", "ID": "CVE-2022-2371",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "YaySMTP < 2.2.1 - Subscriber+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "YaySMTP Simple WP SMTP Mail",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "2.2.1",
"version_value": "2.2.1"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The YaySMTP WordPress plugin before 2.2.1 does not have proper authorisation when saving its settings, allowing users with a role as low as subscriber to change them, and use that to conduct Stored Cross-Site Scripting attack due to the lack of escaping in them as well."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7",
"name": "https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Rafshanzani Suhada"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2372", "ID": "CVE-2022-2372",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "YaySMTP < 2.2.2 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "YaySMTP Simple WP SMTP Mail",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "2.2.2",
"version_value": "2.2.2"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45",
"name": "https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Rafshanzani Suhada"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2386", "ID": "CVE-2022-2386",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Crowdsignal Polls & Ratings < 3.0.8 - Reflected Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Crowdsignal Dashboard Polls, Surveys & more",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Crowdsignal Dashboard WordPress plugin before 3.0.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/47855d4b-9f6a-4fc7-b231-4337f51c8886",
"name": "https://wpscan.com/vulnerability/47855d4b-9f6a-4fc7-b231-4337f51c8886"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "ZhongFu Su(JrXnm) of WuHan University"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2391", "ID": "CVE-2022-2391",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Inspiro Pro < 7.2.3 - Contributor+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Inspiro PRO",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "7.2.3",
"version_value": "7.2.3"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Inspiro PRO WordPress plugin does not sanitize the portfolio slider description, allowing users with privileges as low as Contributor to inject JavaScript into the description."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3",
"name": "https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Fortune Sam Okon"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2395", "ID": "CVE-2022-2395",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "weForms < 1.6.14 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "weForms Easy Drag & Drop Contact Form Builder For WordPress",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.6.14",
"version_value": "1.6.14"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The weForms WordPress plugin before 1.6.14 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b",
"name": "https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Tri Wanda Septian"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2398", "ID": "CVE-2022-2398",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "WP Comments Fields < 4.1 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WordPress Comments Fields",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "4.1",
"version_value": "4.1"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The WordPress Comments Fields WordPress plugin before 4.1 does not escape Field Error Message, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672",
"name": "https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Rafshanzani Suhada"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2409", "ID": "CVE-2022-2409",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Rough Chart <= 1.0.0 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Rough Chart",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.0.0",
"version_value": "1.0.0"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Rough Chart WordPress plugin through 1.0.0 does not properly escape chart data label, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea",
"name": "https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Siddhant Suresh Ughade"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,79 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2410", "ID": "CVE-2022-2410",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "mTouch Quiz <= 3.1.3 - Admin+ Stored Cross Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "mTouch Quiz",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.1.3",
"version_value": "3.1.3"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The mTouch Quiz WordPress plugin through 3.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18",
"name": "https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Vinay Varma Mudunuri"
},
{
"lang": "eng",
"value": "Krishna Harsha Kondaveeti"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,79 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2411", "ID": "CVE-2022-2411",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Auto More Tag <= 4.0.0 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Auto More Tag",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "4.0.0",
"version_value": "4.0.0"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Auto More Tag WordPress plugin through 4.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294",
"name": "https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Vinay Varma Mudunuri"
},
{
"lang": "eng",
"value": "Krishna Harsha Kondaveeti"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,79 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2412", "ID": "CVE-2022-2412",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Better Tag Cloud <= 0.99.5 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Better Tag Cloud",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0.99.5",
"version_value": "0.99.5"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Better Tag Cloud WordPress plugin through 0.99.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6",
"name": "https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Vinay Varma Mudunuri"
},
{
"lang": "eng",
"value": "Krishna Harsha Kondaveeti"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,79 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2423", "ID": "CVE-2022-2423",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "DW Promobar <= 1.0.4 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "DW Promobar",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.0.4",
"version_value": "1.0.4"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The DW Promobar WordPress plugin through 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2",
"name": "https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Vinay Varma Mudunuri"
},
{
"lang": "eng",
"value": "Krishna Harsha Kondaveeti"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,79 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2424", "ID": "CVE-2022-2424",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Google Maps Anywhere <= 1.2.6.3 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Google Maps Anywhere",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.2.6.3",
"version_value": "1.2.6.3"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Google Maps Anywhere WordPress plugin through 1.2.6.3 does not sanitise and escape any of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909",
"name": "https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Vinay Varma Mudunuri"
},
{
"lang": "eng",
"value": "Krishna Harsha Kondaveeti"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,79 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2425", "ID": "CVE-2022-2425",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "WP DS Blog Map <= 3.1.3 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WP DS Blog Map",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.1.3",
"version_value": "3.1.3"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The WP DS Blog Map WordPress plugin through 3.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d",
"name": "https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Vinay Varma Mudunuri"
},
{
"lang": "eng",
"value": "Krishna Harsha Kondaveeti"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2426", "ID": "CVE-2022-2426",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "Thinkific Uploader <= 1.0.0 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Thinkific Uploader",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.0.0",
"version_value": "1.0.0"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The Thinkific Uploader WordPress plugin through 1.0.0 does not sanitise and escape its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks against other administrators."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422",
"name": "https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "Raad Haddad"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-2460", "ID": "CVE-2022-2460",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "contact@wpscan.com",
"STATE": "RESERVED" "STATE": "PUBLIC",
"TITLE": "WPDating <= 7.1.9 - Multiple SQL Injection Issues"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WPDating",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "7.1.9",
"version_value": "7.1.9"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The WPDating WordPress plugin through 7.1.9 does not properly escape user input before concatenating it to certain SQL queries, leading to multiple SQL injection vulnerabilities."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db",
"name": "https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-89 SQL Injection",
"lang": "eng"
} }
] ]
} }
]
},
"credit": [
{
"lang": "eng",
"value": "WPScanTeam"
}
],
"source": {
"discovery": "EXTERNAL"
}
} }