Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2582

EPSS 0.28% · P51
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-2582

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A prototype pollution vulnerability exists in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications and sites built with Strikingly. The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the user's browser.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Strikingly CMS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Strikingly CMS是一款内容发布平台。 Strikingly CMS存在安全漏洞,该漏洞源于Strikingly JavaScript库解析URL片段允许访问__proto__或构造函数属性和对象原型。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Strikingly All versions -

II. Public POCs for CVE-2023-2582

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-2582

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-05-08 · 30 CVEs total

CVE-2020-22334BEESCMS 跨站请求伪造漏洞
CVE-2023-1031MonicaHQ 安全漏洞
CVE-2023-1094MonicaHQ 安全漏洞
CVE-2023-30787MonicaHQ 跨站脚本漏洞
CVE-2023-30788MonicaHQ 跨站脚本漏洞
CVE-2023-30789MonicaHQ 跨站脚本漏洞
CVE-2023-30790MonicaHQ 跨站脚本漏洞
CVE-2023-32233Linux kernel 资源管理错误漏洞
CVE-2023-2513Linux kernel 资源管理错误漏洞
CVE-2023-30334AsmBB 安全漏洞
CVE-2020-18131Clan Scripts 跨站请求伪造漏洞
CVE-2020-18132MIPCMS 跨站脚本漏洞
CVE-2020-18282NoneCMS 跨站脚本漏洞
CVE-2020-19660Editor.md 跨站脚本漏洞
CVE-2020-21038typecho 输入验证错误漏洞
CVE-2023-30018Judging Management System SQL注入漏洞
CVE-2020-22755MingSoft MCMS 代码问题漏洞
CVE-2020-23966Victor CMS SQL注入漏洞
CVE-2020-36065sunkaifei FlyCms 跨站请求伪造漏洞
CVE-2021-27280mblog 代码问题漏洞

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-2582

No comments yet


Leave a comment