mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-31 10:41:19 +00:00
28 lines
928 B
JSON
28 lines
928 B
JSON
![]() |
{
|
||
|
"id": "CVE-2023-27121",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2023-10-04T19:15:10.063",
|
||
|
"lastModified": "2023-10-04T19:53:11.513",
|
||
|
"vulnStatus": "Awaiting Analysis",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "A cross-site scripting (XSS) vulnerability in the component /framework/cron/action/humanize of Pleasant Solutions Pleasant Password Server v7.11.41.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cronString parameter."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://pleasantpasswords.com/download",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.mdsec.co.uk/2023/09/the-not-so-pleasant-password-manager/",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.nuget.org/packages/CronExpressionDescriptor/2.9.0",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|