Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-79
Total 21765 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-16030 1 Google 1 Chrome 2021-01-11 4.3 MEDIUM 6.1 MEDIUM
Insufficient data validation in Blink in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
CVE-2020-36171 1 Elementor 1 Website Builder 2021-01-11 4.3 MEDIUM 6.1 MEDIUM
The Elementor Website Builder plugin before 3.0.14 for WordPress does not properly restrict SVG uploads.
CVE-2020-35262 1 Digisol 2 Dg-hr3400, Dg-hr3400 Firmware 2021-01-08 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS) vulnerability in Digisol DG-HR3400 can be exploited via the NTP server name in Time and date module and "Keyword" in URL Filter.
CVE-2020-36172 1 Advancedcustomfields 1 Advanced Custom Fields 2021-01-08 4.3 MEDIUM 6.1 MEDIUM
The Advanced Custom Fields plugin before 5.8.12 for WordPress mishandles the escaping of strings in Select2 dropdowns, potentially leading to XSS.
CVE-2020-25498 1 Beetel 2 777vr1, 777vr1 Firmware 2021-01-08 3.5 LOW 4.8 MEDIUM
Cross Site Scripting (XSS) vulnerability in Beetel router 777VR1 can be exploited via the NTP server name in System Time and "Keyword" in URL Filter.
CVE-2020-4895 1 Ibm 1 Emptoris Strategic Supply Management 2021-01-08 3.5 LOW 5.4 MEDIUM
IBM Emptoris Strategic Supply Management 10.1.0, 10.1.1, and 10.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190986.
CVE-2020-35170 1 Dell 2 Powermax Os, Unisphere 2021-01-08 3.5 LOW 5.4 MEDIUM
Dell EMC Unisphere for PowerMax versions prior to 9.1.0.9, Dell EMC Unisphere for PowerMax versions prior to 9.0.2.16, and Dell EMC PowerMax OS 5978.221.221 and 5978.479.479 contain a Cross-Site Scripting (XSS) vulnerability. An authenticated malicious user may potentially exploit this vulnerability to inject javascript code and affect other authenticated users’ sessions.
CVE-2020-35946 1 Semperplugins 1 All In One Seo Pack 2021-01-08 3.5 LOW 5.4 MEDIUM
An issue was discovered in the All in One SEO Pack plugin before 3.6.2 for WordPress. The SEO Description and Title fields are vulnerable to unsanitized input from a Contributor, leading to stored XSS.
CVE-2015-2992 1 Apache 1 Struts 2021-01-08 4.3 MEDIUM 6.1 MEDIUM
Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.
CVE-2019-20483 1 Vikisolutions 1 Vera 2021-01-08 3.5 LOW 5.4 MEDIUM
An issue was discovered in Viki Vera 4.9.1.26180. An attacker could set a user's last name to an XSS Payload, and read another user's cookie and use that to login to the application.
CVE-2020-26046 1 Thedaylightstudio 1 Fuel Cms 2021-01-08 4.3 MEDIUM 5.4 MEDIUM
FUEL CMS 1.4.11 has stored XSS in Blocks/Navigation/Site variables. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account and also impact other visitors.
CVE-2017-6484 1 Inter-mediator 1 Inter-mediator 2021-01-08 4.3 MEDIUM 6.1 MEDIUM
Multiple Cross-Site Scripting (XSS) issues were discovered in INTER-Mediator 5.5. The vulnerabilities exist due to insufficient filtration of user-supplied data (c and cred) passed to the "INTER-Mediator-master/Auth_Support/PasswordReset/resetpassword.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
CVE-2017-6478 1 Mangoswebv4 Project 1 Mangoswebv4 2021-01-08 4.3 MEDIUM 6.1 MEDIUM
paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (step parameter).
CVE-2020-35741 1 Hgiga 4 Msr45 Isherlock-antispam, Msr45 Isherlock-user, Ssr45 Isherlock-antispam and 1 more 2021-01-08 4.3 MEDIUM 6.1 MEDIUM
HGiga MailSherlock does not validate user parameters on multiple login pages. Attackers can use the vulnerability to inject JavaScript syntax for XSS attacks.
CVE-2020-35740 1 Hgiga 4 Msr45 Isherlock-antispam, Msr45 Isherlock-user, Ssr45 Isherlock-antispam and 1 more 2021-01-08 4.3 MEDIUM 6.1 MEDIUM
HGiga MailSherlock does not validate specific URL parameters properly that allows attackers to inject JavaScript syntax for XSS attacks.
CVE-2015-9251 2 Jquery, Oracle 47 Jquery, Agile Product Lifecycle Management For Process, Banking Platform and 44 more 2021-01-08 4.3 MEDIUM 6.1 MEDIUM
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CVE-2021-3014 1 Mikrotik 1 Routeros 2021-01-07 4.3 MEDIUM 6.1 MEDIUM
In MikroTik RouterOS through 2021-01-04, the hotspot login page is vulnerable to reflected XSS via the target parameter.
CVE-2020-26293 1 Htmlsanitizer Project 1 Htmlsanitizer 2021-01-07 4.3 MEDIUM 6.1 MEDIUM
HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. In HtmlSanitizer before version 5.0.372, there is a possible XSS bypass if style tag is allowed. If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. The problem has been fixed in version 5.0.372.
CVE-2020-35717 1 Electronjs 1 Zonote 2021-01-07 3.5 LOW 9.0 CRITICAL
zonote through 0.4.0 allows XSS via a crafted note, with resultant Remote Code Execution (because nodeIntegration in webPreferences is true).
CVE-2020-29497 1 Dell 1 Wyse Management Suite 2021-01-06 3.5 LOW 5.4 MEDIUM
Dell Wyse Management Suite versions prior to 3.1 contain a stored cross-site scripting vulnerability. A remote authenticated malicious user with low privileges could exploit this vulnerability to store malicious HTML or JavaScript code under the device tag. When victim users access the submitted data through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application.