{"id":7658,"date":"2022-03-25T17:44:42","date_gmt":"2022-03-26T00:44:42","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=7658"},"modified":"2023-02-06T11:16:54","modified_gmt":"2023-02-06T18:16:54","slug":"cve-2022-28290-reflected-cross-site-scripting-in-welaunch","status":"publish","type":"zerodays","link":"https:\/\/webdev.securin.xyz\/zerodays\/cve-2022-28290-reflected-cross-site-scripting-in-welaunch\/","title":{"rendered":"CVE-2022-28290 – Reflected Cross-Site Scripting in Welaunch"},"content":{"rendered":"

Reflected Cross-Site Scripting attacks are also known as non-persistent attacks which occur when a malicious script is reflected back from a web application to the victim’s browser. The script is activated through a link, which sends a request to the website with a vulnerability that enables the execution of malicious scripts.<\/p>\n","protected":false},"featured_media":13552,"parent":0,"menu_order":0,"template":"","vulnerability_categories":[],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7658"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":19,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7658\/revisions"}],"predecessor-version":[{"id":13671,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7658\/revisions\/13671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/13552"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7658"}],"wp:term":[{"taxonomy":"vulnerability_categories","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/vulnerability_categories?post=7658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}