Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-79
Total 21765 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-47131 1 Creativeitem 1 Academy Lms 2023-02-09 N/A 4.8 MEDIUM
A Cross-Site Request Forgery (CSRF) in Academy LMS before v5.10 allows an attacker to arbitrarily create a page.
CVE-2023-0599 1 Rapid7 1 Metasploit 2023-02-09 N/A 4.8 MEDIUM
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
CVE-2022-48140 1 Dedecms 1 Dedecms 2023-02-08 N/A 5.4 MEDIUM
DedeCMS v5.7.97 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /file_manage_view.php?fmdo=edit&filename.
CVE-2017-18539 1 Deepsoft 1 Weblibrarian 2023-02-08 4.3 MEDIUM 6.1 MEDIUM
The weblibrarian plugin before 3.4.8.6 for WordPress has XSS via front-end short codes.
CVE-2017-18538 1 Deepsoft 1 Weblibrarian 2023-02-08 4.3 MEDIUM 6.1 MEDIUM
The weblibrarian plugin before 3.4.8.5 for WordPress has XSS via front-end short codes.
CVE-2017-18540 1 Deepsoft 1 Weblibrarian 2023-02-08 4.3 MEDIUM 6.1 MEDIUM
The weblibrarian plugin before 3.4.8.7 for WordPress has XSS via front-end short codes.
CVE-2019-15112 1 Wp-slimstat 1 Slimstat Analytics 2023-02-08 4.3 MEDIUM 6.1 MEDIUM
The wp-slimstat plugin before 4.8.1 for WordPress has XSS.
CVE-2023-24508 1 Baicells 6 Nova227, Nova233, Nova243 and 3 more 2023-02-08 N/A 9.6 CRITICAL
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.
CVE-2022-47983 3 Ibm, Linux, Microsoft 4 Aix, Infosphere Information Server, Linux Kernel and 1 more 2023-02-08 N/A 5.4 MEDIUM
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 243161.
CVE-2022-46934 1 Keking 1 Kkfileview 2023-02-08 N/A 6.1 MEDIUM
kkFileView v4.1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.
CVE-2023-23075 1 Zohocorp 1 Manageengine Assetexplorer 2023-02-08 N/A 6.1 MEDIUM
Cross Site Scripting (XSS) vulnerability in Zoho Asset Explorer 6.9 via the credential name when creating a new Assets Workstation.
CVE-2023-0607 1 Projectsend 1 Projectsend 2023-02-08 N/A 4.8 MEDIUM
Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
CVE-2023-0608 1 Microweber 1 Microweber 2023-02-08 N/A 5.4 MEDIUM
Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2.
CVE-2022-47701 1 Comfast Project 2 Cf-wr623n, Cf-wr623n Firmware 2023-02-07 N/A 6.1 MEDIUM
COMFAST (Shenzhen Sihai Zhonglian Network Technology Co., Ltd) CF-WR623N Router firmware V2.3.0.1 is vulnerable to Cross Site Scripting (XSS).
CVE-2022-47698 1 Comfast Project 2 Cf-wr623n, Cf-wr623n Firmware 2023-02-07 N/A 6.1 MEDIUM
COMFAST (Shenzhen Sihai Zhonglian Network Technology Co., Ltd) CF-WR623N Router firmware V2.3.0.1 is vulnerable to Cross Site Scripting (XSS) via the URL filtering feature in the router.
CVE-2023-23630 1 Eta.js 1 Eta 2023-02-07 N/A 6.1 MEDIUM
Eta is an embedded JS templating engine that works inside Node, Deno, and the browser. XSS attack - anyone using the Express API is impacted. The problem has been resolved. Users should upgrade to version 2.0.0. As a workaround, don't pass user supplied things directly to `res.render`.
CVE-2023-0606 1 Ampache 1 Ampache 2023-02-07 N/A 6.1 MEDIUM
Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.
CVE-2022-4763 1 Wpzoom 1 Icon Widget 2023-02-07 N/A 5.4 MEDIUM
The Icon Widget WordPress plugin before 1.3.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
CVE-2022-39324 1 Grafana 1 Grafana 2023-02-07 N/A 3.5 LOW
Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.
CVE-2022-23552 1 Grafana 1 Grafana 2023-02-07 N/A 5.4 MEDIUM
Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.