漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
wp-file-upload Plugin wfu_ajaxactions.php wfu_ajax_action_callback cross site scripting
漏洞信息
A vulnerability has been found in wp-file-upload Plugin up to 2.4.3 on WordPress and classified as problematic. Affected by this vulnerability is the function wfu_ajax_action_callback of the file lib/wfu_ajaxactions.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.4.4 is able to address this issue. The identifier of the patch is c846327df030a0a97da036a2f07c769ab9284ddb. It is recommended to upgrade the affected component. The identifier VDB-258781 was assigned to this vulnerability.
漏洞信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
漏洞
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞
WordPress plugin wp-file-upload 跨站脚本漏洞
漏洞信息
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin wp-file-upload 2.4.3版本及之前版本存在跨站脚本漏洞。攻击者利用该漏洞执行跨站点脚本攻击。
漏洞信息
N/A
漏洞
N/A