[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-1557":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":47},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":44,"name":45,"published":46,"updated":27},1557,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},2,"Nuclei",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":37,"epss_score":38,"epss_percentile":39,"cve":40,"in_cisa_catalog":42,"date":43,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"medium","Authenticated attackers can inject malicious JavaScript via the tab parameter, potentially stealing administrator session cookies or performing administrative actions.","The Ditty (formerly Ditty News Ticker) WordPress plugin before 3.0.15 is affected by a Reflected Cross-Site Scripting (XSS) vulnerability.","upgrade to v.3.0.15",[33,34,35,36],"https://wpscan.com/vulnerability/40f36692-c898-4441-ad24-2dc17856bd74","https://nvd.nist.gov/vuln/detail/CVE-2022-0533","https://vulners.com/cve/CVE-2022-0533","https://plugins.trac.wordpress.org/changeset/2675223/ditty-news-ticker",6.1,0.04689,0.89324,[41],"CVE-2022-0533",false,"2022-03-07T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2022-0533","Ditty (formerly Ditty News Ticker) \u003C 3.0.15 - Cross-Site Scripting","2023-10-18T00:00:00Z",["Island",48],{"key":49,"params":50,"result":52},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":51},"{\"text-color\":\"gray\"}",{"head":53},{}]