漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple client-side cross site scripting vulnerabilities have been discovered in the WpJobBoard v4.5.1 web-application for WordPress. The vulnerabilities are located in the `query` and `id` parameters of the `wpjb-email`, `wpjb-job`, `wpjb-application`, and `wpjb-membership` modules. Remote attackers are able to inject malicious script code to hijack admin session credentials via the backend, or to manipulate the backend on client-side performed requests. The attack vector is non-persistent and the request method to inject is GET. The attacker does not need a privileged user account to perform a successful exploitation.
漏洞信息
N/A
漏洞
N/A
漏洞
WordPress WpJobBoard多个组件跨站脚本漏洞
漏洞信息
WordPress WpJobBoard是一款应用在WordPress中的工作面板插件。wpjb-email、wpjb-job、wpjb-application和wpjb-membership都是其中的组件。wpjb-email是一个电子邮件组件。wpjb-job是一个工作管理组件。 WordPress WpJobBoard 4.5.1版本中的多个组件的‘query’和‘id’参数存在多个跨站脚本漏洞。远程攻击者可利用该漏洞注入恶意的脚本代码,劫持管理员会话证书。以下组件受到影响:wpjb-email;w
漏洞信息
N/A
漏洞
N/A