Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-7377

EPSS 5.83% · P91
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-7377

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Cross-site scripting (XSS) vulnerability in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allows remote attackers to inject arbitrary web script or HTML via the invitaion_code parameter in a pie-register page to the default URI.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress Pie Register插件跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Pie Register是其中的一个支持自定义会员注册登陆页面的插件。 WordPress Pie Register插件2.0.19之前版本的pie-register/pie-register.php脚本中存在跨站脚本漏洞,该漏洞源于程序没有充分过滤pie-register页面中的‘invitaion_code’参数。远程攻击者可利用该漏洞注入任意Web脚本或HTM
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-7377

#POC DescriptionSource LinkShenlong Link
1WordPress Pie Register before 2.0.19 contains a reflected cross-site scripting vulnerability in pie-register/pie-register.php which allows remote attackers to inject arbitrary web script or HTML via the invitaion_code parameter in a pie-register page to the default URL.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2015/CVE-2015-7377.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-7377

Please Login to view more intelligence information

Same Patch Batch · n/a · 2015-10-16 · 21 CVEs total

CVE-2015-5742Veeam Backup & Replication VeeamVixProxy组件信息泄露漏洞
CVE-2015-6334Cisco ASR 5000和5500设备拒绝服务漏洞
CVE-2015-6333Cisco Application Policy Infrastructure Controller 安全漏洞
CVE-2015-6003QNAP Systems QTS 目录遍历漏洞
CVE-2015-5660eXtplorer 跨站请求伪造漏洞
CVE-2015-4948IBM AIX和VIOS netstat 安全漏洞
CVE-2013-7445Linux kernel Direct Rendering Manager子系统拒绝服务漏洞
CVE-2015-7856OpenNMS 信任管理漏洞
CVE-2015-7683WordPress Font插件绝对路径遍历漏洞
CVE-2015-7682WordPress Pie Register插件SQL注入漏洞
CVE-2014-6449Juniper Networks Junos OS 拒绝服务
CVE-2015-1814CloudBees Jenkins CI和LTS API token-issuing服务权限许可和访问控制漏洞
CVE-2015-1813CloudBees Jenkins CI和LTS 跨站脚本漏洞
CVE-2015-1812CloudBees Jenkins CI和LTS 跨站脚本漏洞
CVE-2015-1810CloudBees Jenkins CI和LTS 权限许可和访问控制漏洞
CVE-2015-1808CloudBees Jenkins CI和LTS 输入验证漏洞
CVE-2015-1807CloudBees Jenkins CI和LTS 目录遍历漏洞
CVE-2015-1806CloudBees Jenkins CI和LTS 权限许可和访问控制漏洞
CVE-2014-6451Juniper Networks vSRX virtual防火墙拒绝服务漏洞
CVE-2014-6450Juniper Networks Junos OS 缓冲区溢出漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2015-7377

No comments yet


Leave a comment