Total
21765 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-41434 | 1 Eyesofnetwork | 1 Web Interface | 2022-11-08 | N/A | 6.1 MEDIUM |
EyesOfNetwork Web Interface v5.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /lilac/main.php. | |||||
CVE-2022-3869 | 1 Froxlor | 1 Froxlor | 2022-11-07 | N/A | 6.1 MEDIUM |
Code Injection in GitHub repository froxlor/froxlor prior to 0.10.38.2. | |||||
CVE-2022-43046 | 1 Food Ordering Management System Project | 1 Food Ordering Management System | 2022-11-07 | N/A | 4.8 MEDIUM |
Food Ordering Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /foms/place-order.php. | |||||
CVE-2022-3873 | 1 Diagrams | 1 Drawio | 2022-11-07 | N/A | 6.1 MEDIUM |
Cross-site Scripting (XSS) - DOM in GitHub repository jgraph/drawio prior to 20.5.2. | |||||
CVE-2020-24223 | 1 Mara Cms Project | 1 Mara Cms | 2022-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
Mara CMS 7.5 allows cross-site scripting (XSS) in contact.php via the theme or pagetheme parameters. | |||||
CVE-2022-43568 | 1 Splunk | 2 Splunk, Splunk Cloud Platform | 2022-11-07 | N/A | 6.1 MEDIUM |
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio. | |||||
CVE-2022-32172 | 1 Zinclabs | 1 Zinc | 2022-11-07 | N/A | 5.4 MEDIUM |
In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete template functionality. When an authenticated user deletes a template with a XSS payload in the name field, the Javascript payload will be executed and allow an attacker to access the user’s credentials. | |||||
CVE-2022-32171 | 1 Zinclabs | 1 Zinc | 2022-11-07 | N/A | 5.4 MEDIUM |
In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete user functionality. When an authenticated user deletes a user having a XSS payload in the user id field, the javascript payload will be executed and allow an attacker to access the user’s credentials. | |||||
CVE-2019-3847 | 1 Moodle | 1 Moodle | 2022-11-07 | 3.5 LOW | 4.8 MEDIUM |
A vulnerability was found in moodle before versions 3.6.3, 3.5.5, 3.4.8 and 3.1.17. Users with the "login as other users" capability (such as administrators/managers) can access other users' Dashboards, but the JavaScript those other users may have added to their Dashboard was not being escaped when being viewed by the user logging in on their behalf. | |||||
CVE-2019-3810 | 1 Moodle | 1 Moodle | 2022-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users' full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted. | |||||
CVE-2021-32478 | 1 Moodle | 1 Moodle | 2022-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
The redirect URI in the LTI authorization endpoint required extra sanitizing to prevent reflected XSS and open redirect risks. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8 and earlier unsupported versions are affected. | |||||
CVE-2022-22818 | 3 Debian, Djangoproject, Fedoraproject | 3 Debian Linux, Django, Fedora | 2022-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS. | |||||
CVE-2021-41182 | 7 Debian, Drupal, Fedoraproject and 4 more | 37 Debian Linux, Drupal, Fedora and 34 more | 2022-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. | |||||
CVE-2021-41184 | 6 Drupal, Fedoraproject, Jquery and 3 more | 35 Drupal, Fedora, Jquery Ui and 32 more | 2022-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources. | |||||
CVE-2022-43561 | 1 Splunk | 2 Splunk, Splunk Cloud Platform | 2022-11-07 | N/A | 4.8 MEDIUM |
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the “power” Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web enabled. | |||||
CVE-2021-41183 | 7 Debian, Drupal, Fedoraproject and 4 more | 36 Debian Linux, Drupal, Fedora and 33 more | 2022-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources. | |||||
CVE-2021-39473 | 1 Hotelmanager Project | 1 Hotelmanager | 2022-11-06 | N/A | 5.4 MEDIUM |
Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields. | |||||
CVE-2022-29931 | 1 Raytion | 1 Custom Security Manager | 2022-11-04 | 4.3 MEDIUM | 6.1 MEDIUM |
The administration interface of the Raytion Custom Security Manager (Raytion CSM) in Version 7.2.0 allows reflected Cross-site Scripting (XSS). | |||||
CVE-2022-1937 | 1 Awin | 1 Awin Data Feed | 2022-11-04 | 4.3 MEDIUM | 6.1 MEDIUM |
The Awin Data Feed WordPress plugin before 1.8 does not sanitise and escape a parameter before outputting it back via an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting | |||||
CVE-2022-34171 | 1 Jenkins | 1 Jenkins | 2022-11-04 | 4.3 MEDIUM | 6.1 MEDIUM |
In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability. |