2 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Shields.io is a service for concise, consistent, and legible badges in SVG and raster format. Shields.io and users self-hosting their own instance of shields using version < `server-2024-09-25` are vulnerable to a remote execution vulnerability via the JSONPath library used by the Dynamic JSON/Toml/Yaml badges. This vulnerability would allow any user with access to make a request to a URL on the instance to the ability to execute code by crafting a malicious JSONPath expression. All users who self-host an instance are vulnerable. This problem was fixed in server-2024-09-25. • https://github.com/badges/shields/commit/ec1b6c8daccda075403c1688ac02603f7aaa50b2 https://github.com/badges/shields/issues/10553 https://github.com/badges/shields/pull/10551 https://github.com/badges/shields/security/advisories/GHSA-rxvx-x284-4445 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 2

Persistent XSS in wordpress plugin rockhoist-badges v1.2.2. XSS persistente en el plugin rockhoist-badges v1.2.2 de wordpress. Persistent XSS in wordpress plugin rockhoist-badges v1.2.2 via badge description and title fields. • http://www.securityfocus.com/bid/96533 http://www.vapidlabs.com/advisory.php?v=176 https://wpvulndb.com/vulnerabilities/8763 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •