WordPress Sniplets 1.1.2 and 1.2.2 plugin contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via the text parameter to warning.php, notice.php, and inset.php in view/sniplets/, and possibly modules/execute.php; via the url parameter to view/admin/submenu.php; and via the page parameter to view/admin/pager.php.
Directory traversal vulnerability in the file_get_contents function in SOPlanning 1.32 and earlier allows remote attackers to determine the existence of arbitrary files via a .. (dot dot) in a URL path parameter.
8
+
SOPlanning <1.32 contain a directory traversal in the file_get_contents function via a .. (dot dot) in the fichier parameter.
Cross-site scripting (XSS) vulnerability in BIBLIOsoft BIBLIOpac 2008 allows remote attackers to inject arbitrary web script or HTML via the db or action parameter to to bin/wxis.exe/bibliopac/.
8
+
BIBLIOsoft BIBLIOpac 2008 contains a cross-site scripting vulnerability via the db or action parameter to bin/wxis.exe/bibliopac/, which allows a remote attacker to inject arbitrary web script or HTML.
description: The Web Application Firewall in Bitrix24 through 20.0.0 allows XSS via the items[ITEMS][ID] parameter to the components/bitrix/mobileapp.list/ajax.php/ URI.
7
+
description: The Web Application Firewall in Bitrix24 uptoandincluding 20.0.0 allows XSS via the items[ITEMS][ID] parameter to the components/bitrix/mobileapp.list/ajax.php/ URI.
name: OpenID Connect Generic Client 3.8.0-3.8.1 - Reflected Cross Site Scripting (XSS) via Login Error
4
+
author: tess
5
+
severity: medium
6
+
description: The OpenID Connect Generic Client WordPress plugin 3.8.0 and 3.8.1 did not sanitise the login error when output back in the login form, leading to a reflected Cross-Site Scripting issue. This issue does not require authentication and can be exploited with the default configuration.
name: Contact Form bySupsystic<1.7.15 - Cross-Site Scripting
4
+
name: WordPressSupsysticContact Form <1.7.15 - Cross-Site Scripting
5
5
author: dhiyaneshDK
6
6
severity: medium
7
-
description: The Contact Form bySupsysticWordPressplugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute,leadingtoareflectedCross-SiteScriptingissue
7
+
description: WordPressSupsystic Contact Form plugin before 1.7.15 containsacross-sitescriptingvulnerability.Itdoes not sanitize the tab parameter of its options page before outputting it in an attribute.
Cross-site Scripting (XSS) discovered in microweber prior to 1.2.12. Type parameter in the body of POST request triggered by add/edit tax in microweb are vulnerable to stored XSS.
8
+
Microweber prior to 1.2.12 contains a stored cross-site scripting vulnerability via the Type parameter in the body of POST request, which is triggered by Add/Edit Tax.
Multiple Stored Cross-site Scripting (XSS) Vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods in GitHub repository microweber/microweber prior to 1.2.11.
8
+
Microweber before 1.2.1 contains multiple stored cross-site scripting vulnerabilities in Shop's Other Settings, Autorespond E-mail Settings, and Payment Methods.
The Gwyn's Imagemap Selector Wordpresssplugin does not sanitize the id and class parameters before returning them back in attributes,leadingtoaReflectedCross-SiteScripting.
8
+
Wordpress Gwyn's Imagemap Selector plugin0.3.3andpriorcontainsareflectedcross-sitescriptingvulnerability.It does not sanitize the id and class parameters before returning them back in attributes.
description: Reflected XSS in microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.
7
+
description: Microweber prior to 1.2.15 contains a reflected cross-site scripting vulnerability. An attacker can execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
The plugin, used as a companion for the Discy and Himer themes,
9
-
does not sanitise and escape a parameter on its reset password
10
-
form which makes it possible to perform reflected XSS.
8
+
WordPress WPQA plugin prior to 5.4 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape a parameter on its reset password form.
description: The plugin does not properly sanitise and escape parameters before outputting them back in AJAX actions,leadingtoReflectedCross-SiteScripting.
7
+
description: WordPressSimpleMembership plugin before4.1.1containsareflectedcross-sitescriptingvulnerability.Itdoes not properly sanitize and escape parameters before outputting them back in AJAX actions.
The plugin does not sanitize and escape parameter before reflecting it back in a page available to any user (both authenticated and unauthenticated) when a specific setting is enabled,leadingtoareflectedcross-sitescripting.
8
+
WordPressEasyPricingTables plugin before3.2.1containsareflectedcross-sitescriptingvulnerability.Itdoes not sanitize and escape aparameter before reflecting it back in a page available to any user both authenticated and unauthenticated when a specific setting is enabled.
The plugin does not sanitise and escape a parameter before outputting it back via an AJAX action available to both unauthenticated and authenticated users,leadingtoaReflectedCross-SiteScripting when a specific setting is enabled.
8
+
WordPressCopyrightProof plugin 4.16andpriorcontainsacross-sitescriptingvulnerability.Itdoes not sanitize and escape a parameter before outputting it back via an AJAX action available to both unauthenticated and authenticated users when a specific setting is enabled.
name: WordPressAwin Data Feed <=1.6 - Cross-Site Scripting
5
5
author: Akincibor,DhiyaneshDK
6
6
severity: medium
7
7
description: |
8
-
The plugin does not sanitise and escape a parameter before outputting it back via an AJAX action (available to both unauthenticated and authenticated users),leadingtoaReflectedCross-SiteScripting.
8
+
WordPressAwinDataFeed plugin 1.6andpriorcontainsacross-sitescriptingvulnerability.Itdoes not sanitize and escape a parameter before outputting it back via an AJAX action, available to both unauthenticated and authenticated users.
description: The plugin does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users),leadingtoaReflectedCross-SiteScriptingissue.
7
+
description: WordPressGallery plugin before2.0.0containsareflectedcross-sitescriptingvulnerability.Itdoes not sanitize and escape a parameter before outputting it back in the response of an AJAX action, available to both unauthenticated and authenticated users.
name: Contact Form 7 Captcha <0.1.2 - Cross-Site Scripting
4
+
name: WordPressContact Form 7 Captcha <0.1.2 - Cross-Site Scripting
5
5
author: For3stCo1d
6
6
severity: medium
7
7
description: |
8
-
The Contact Form 7 Captcha WordPressplugin before 0.1.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute,whichcouldleadtoReflectedCross-SiteScriptinginoldwebbrowsers
8
+
WordPress Contact Form 7 Captcha plugin before 0.1.2 containsareflectedcross-sitescriptingvulnerability.Itdoes not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute.
description: Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.
7
+
description: Trilium prior to 0.52.4, 0.53.1-beta contains a cross-site scripting vulnerability which can allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.
name: Feed Them Social <3.0.1 - Cross-Site Scripting
4
+
name: WordPressFeed Them Social <3.0.1 - Cross-Site Scripting
5
5
author: akincibor
6
6
severity: medium
7
7
description: |
8
-
The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting.
8
+
WordPress Feed Them Social plugin before 3.0.1 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape a parameter before outputting it back in the page.
name: PKP Open JournalsSystem 3.3 - Cross-Site Scripting
4
+
name: PKP Open JournalSystems2.4.8-3.3 - Cross-Site Scripting
5
5
author: lucasljm2001,ekrause
6
6
severity: medium
7
7
description: |
8
-
Detects an XSS vulnerability in Open Journals System.
8
+
PKP Open Journal Systems 2.4.8 to 3.3 contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary code via the X-Forwarded-Host Header.
ZohoManageEngine ADSelfService Plus before 6121 allowsXSS via the welcome name attribute to the Reset Password, Unlock Account, or User Must Change Password screen.
8
+
ManageEngine ADSelfService Plus before 6121 containsastoredcross-sitescriptingvulnerability via the welcome name attribute to the Reset Password, Unlock Account, or User Must Change Password screens.
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings.
8
+
Contao prior to 4.13.3 contains a cross-site scripting vulnerability. It is possible to inject arbitrary JavaScript code into the canonical tag.
Reprise License Manager 14.2 isaffectedby a reflected cross-site scripting vulnerability(XSS) in the /goform/login_process "username" parameter via GET.No authentication is required.
8
+
Reprise License Manager 14.2 contains a reflected cross-site scripting vulnerability in the /goform/login_process 'username' parameter via GET,wherebyno authentication is required.
name: Online Birth Certificate System V1.2 - Stored Cross-Site scripting
3
+
name: Online Birth Certificate System 1.2 - Stored Cross-Site Scripting
4
4
author: TenBird
5
5
severity: medium
6
6
description: |
7
-
Multiple cross-site scripting(XSS) vulnerabilities in the component /obcs/user/profile.php ofOnlineBirthCertificateSystemv1.2allowsattackers to execute arbitrary web scripts or HTML via a crafted payload injected into the fname or lname parameters.
7
+
OnlineBirthCertificateSystem1.2containsmultiplestored cross-site scripting vulnerabilities in the component /obcs/user/profile.php,whichallowsanattacker to execute arbitrary web script or HTML via a crafted payload injected into the fname or lname parameters.
kkFileView v4.0.0 wasdiscoveredtocontain multiple cross-site scripting(XSS) vulnerabilities via the urls and currentUrl parameters at /controller/OnlinePreviewController.java.
8
+
kkFileView 4.0.0 contains multiple cross-site scripting vulnerabilities via the urls and currentUrl parameters at /controller/OnlinePreviewController.java.
A reflected XSS issue exists in the Management Console of several WSO2 products.
8
+
WSO2 contains a reflected cross-site scripting vulnerability in the Management Console of API Manager 2.2.0, 2.5.0, 2.6.0, 3.0.0, 3.1.0, 3.2.0, and 4.0.0; API Manager Analytics 2.2.0, 2.5.0, and 2.6.0; API Microgateway 2.2.0; Data Analytics Server 3.2.0; Enterprise Integrator 6.2.0, 6.3.0, 6.4.0, 6.5.0, and 6.6.0; IS as Key Manager 5.5.0, 5.6.0, 5.7.0, 5.9.0, and 5.10.0; Identity Server 5.5.0, 5.6.0, 5.7.0, 5.9.0, 5.10.0, and 5.11.0; Identity Server Analytics 5.5.0 and 5.6.0; and WSO2 Micro Integrator 1.0.0.
A cross-site scripting (xss)vulnerabilityexists in the footer alerts functionality ofWWBNAVideo11.6via"toast" parameter which is inserted into the document with insufficient sanitization.
8
+
WWBNAVideo11.6containsa cross-site scripting vulnerability in the footer alerts functionality viathe'toast' parameter, which is inserted into the document with insufficient sanitization.
A cross-site scripting (xss)vulnerabilityexists in the footer alerts functionality ofWWBNAVideo11.6via"success" parameter which is inserted into the document with insufficient sanitization.
8
+
WWBNAVideo11.6containsa cross-site scripting vulnerability in the footer alerts functionality viathe'success' parameter, which is inserted into the document with insufficient sanitization.
A cross-site scripting (xss)vulnerabilityexists in the footer alerts functionality ofWWBNAVideo11.6via"msg" parameter which is inserted into the document with insufficient sanitization.
8
+
WWBNAVideo11.6containsa cross-site scripting vulnerability in the footer alerts functionality viathe'msg' parameter, which is inserted into the document with insufficient sanitization.
kkFileView v4.1.0 wasdiscoveredtocontain multiple cross-site scripting(XSS) vulnerabilities via the urls and currentUrl parameters at /controller/OnlinePreviewController.java.
8
+
kkFileView 4.1.0 contains multiple cross-site scripting vulnerabilities via the urls and currentUrl parameters at /controller/OnlinePreviewController.java.
Thereexists a reflectedXSSwithin the logout functionalityofServiceNow.Thisenables an unauthenticated remote attacker to execute arbitrary JavaScript.
8
+
ServiceNowthroughSanDiegoPatch4bandPatch6contains a cross-sitescriptingvulnerabilityin the logout functionality,whichcanenable an unauthenticated remote attacker to execute arbitrary JavaScript.
description: Default Creds and there is XSS here, /examples/jsp/security/protected/index.jsp?dataName=%22%3E%3Cimg+src%3Dd+onerror%3Dalert%28document.cookie%29%3E&dataValue= after you login you will be able to get it.
7
+
description: Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 default login credentials were successful.
Requests using the selector childlistcananXSS when the dispatcher does not respect the content-type responded by AEM and flips from application/json to text/html. As a consequence the reflected suffix is executed and interpreted in the browser.
8
+
AdobeExperienceManagercontainsacross-sitescriptingvulnerabilityviarequests using the selector childlist when the dispatcher does not respect the content-type responded by AEM and flips from application/json to text/html. As a consequence, the reflected suffix is executed and interpreted in the browser.
description: Open Akamai ARL contains a cross-site scripting vulnerability. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site.
description: The following example scripts that come with Apache Tomcat v4.x - v7.x and can be used by attackers to gain information about the system. These scripts are also known to be vulnerable to cross site scripting (XSS) injection.
6
+
severity: high
7
+
description: Apache Tomcat 4.x through 7.x contains a cross-site scripting vulnerability which can be used by an attacker to execute arbitrary script in the browser of an unsuspecting user in the context of the affected site.
description: Unauthenticated Server-Side Request Forgery (SSRF) and Remote File Include (RFI) vulnerability exists in OpenBMCS within its functionalities. The application parses user supplied data in the POST parameter
8
-
'ip' to query a server IP on port 81 by default. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary
9
-
destination host. This can be used by an external attacker for example to bypass firewalls and initiate a service and network enumeration on the internal network through the affected application, allows hijacking
10
-
the current session of the user, execute cross-site scripting code or changing the look of the page and content modification on current display
7
+
description: OpenBMCS 2.4 is susceptible to unauthenticated server-side request forgery and remote file inclusion vulnerabilities within its functionalities. The application parses user supplied data in the POST parameter 'ip' to query a server IP on port 81 by default. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host.
description: postMessage contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and therefore steal cookie-based authentication credentials and launch other attacks.
description: Setting the XSS-Protection header is deprecated by most browsers. Setting the header to anything other than `0` can actually introduce an XSS vulnerability.
6
+
severity: high
7
+
description: XSS-Protection header in Explorer, Chrome, and Safari contains a cross-site scripting vulnerability if set to any value other than `0`.
DeDeCMS v5.7 has an XSS vulnerability in the '/include/dialog/config.php' file, and attackers can use this vulnerability to steal user cookies, hang horses, etc.
8
+
DeDeCMS 5.7 contains a cross-site scripting vulnerability in the '/include/dialog/config.php' file. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site.