Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Sep 2024 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mm-breaking News Project
Mm-breaking News Project mm-breaking News |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:mm-breaking_news_project:mm-breaking_news:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Mm-breaking News Project
Mm-breaking News Project mm-breaking News |
Thu, 12 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 12 Sep 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The MM-Breaking News WordPress plugin through 0.7.9 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers | |
| Title | MM-Breaking News <= 0.7.9 - Reflected XSS | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-09-12T12:59:34.191Z
Reserved: 2024-08-21T18:05:53.321Z
Link: CVE-2024-8056
Updated: 2024-09-12T12:59:27.698Z
Status : Analyzed
Published: 2024-09-12T06:15:25.140
Modified: 2024-09-27T21:29:42.600
Link: CVE-2024-8056
No data.
OpenCVE Enrichment
No data.