Method: Wpxf::Exploit::AppointmentScheduleBookingSystemStoredXssShellUpload#initialize
- Defined in:
- lib/wpxf/modules/exploit/xss/stored/appointment_schedule_booking_system_stored_xss_shell_upload.rb
#initialize ⇒ AppointmentScheduleBookingSystemStoredXssShellUpload
Returns a new instance of AppointmentScheduleBookingSystemStoredXssShellUpload.
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 |
# File 'lib/wpxf/modules/exploit/xss/stored/appointment_schedule_booking_system_stored_xss_shell_upload.rb', line 6 def initialize super update_info( name: 'Appointment Schedule Booking System Unauthenticated Stored XSS Shell Upload', author: [ 'White Fir Design', # Disclosure 'rastating' # WPXF module ], references: [ ['WPVDB', '8634'], ['URL', 'https://www.pluginvulnerabilities.com/2016/10/03/persistent-cross-site-scripting-xss-vulnerability-in-wordpress-appointment-schedule-booking-system/'] ], date: 'Oct 04 2016' ) end |