shimo.im
Open in
urlscan Pro
47.243.25.188
Public Scan
Submitted URL: https://shimo.im/docs/Ee32MrJd80iEwyA2
Effective URL: https://shimo.im/docs/Ee32MrJd80iEwyA2/read
Submission: On December 06 via api from US — Scanned from DE
Effective URL: https://shimo.im/docs/Ee32MrJd80iEwyA2/read
Submission: On December 06 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
CVE-2022-45038 11月26日 7:00 更新 注册登录 开启更多功能,提升办公效能 Exploit Title: WBCE CMS v1.5.4 is vulnerable to XSS via /admin/settings/save.php Software Link:https://github.com/WBCE/WBCE_CMS Version: v1.5.4 Describe:A cross-site scripting (XSS) vulnerability in /admin/settings/save.php of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website Footer field. STEPS TO REPRODUCE: Select settings to enter website_ The footer content is <sCRiPt>alert(12345);</sCrIpT> An xss vulnerability was found after accessing any article * 复制图片 * 下载图片 目录 * Steps to reproduce: 三百七十八 阅举报 永久去广告 暂时关闭 永久去广告 暂时关闭 word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1