typora through 0.9.64 has XSS, with resultant remote command execution, during inline rendering of a mathematical formula.
Max CVSS
6.1
EPSS Score
0.19%
Published
2019-01-31
Updated
2019-02-01
typora through 0.9.63 has XSS, with resultant remote command execution, during block rendering of a mathematical formula.
Max CVSS
6.1
EPSS Score
0.19%
Published
2019-01-31
Updated
2019-02-01
An issue was discovered in the Cross Reference Add-on 36 for Google Docs. Stored XSS in the preview boxes in the configuration panel may allow a malicious user to use both label text and references text to inject arbitrary JavaScript code (via SCRIPT elements, event handlers, etc.). Since this code is stored by the plugin, the attacker may be able to target anyone who opens the configuration panel of the plugin.
Max CVSS
6.1
EPSS Score
0.09%
Published
2019-01-31
Updated
2019-02-01
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/file-manager/attachments/edit/4.
Max CVSS
4.8
EPSS Score
0.06%
Published
2019-01-29
Updated
2019-01-29
A stored-self XSS exists in ATutor through v2.2.4, allowing an attacker to execute HTML or JavaScript code in a vulnerable Real Name field to /mods/_core/users/admins/my_edit.php.
Max CVSS
6.1
EPSS Score
0.08%
Published
2019-01-29
Updated
2019-01-29
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/blocks/blocks/edit/8.
Max CVSS
4.8
EPSS Score
0.06%
Published
2019-01-29
Updated
2019-01-29
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/taxonomy/vocabularies.
Max CVSS
4.8
EPSS Score
0.06%
Published
2019-01-29
Updated
2019-01-29
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/menus/menus/edit/3.
Max CVSS
4.8
EPSS Score
0.06%
Published
2019-01-29
Updated
2019-01-29
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Blog field to /admin/nodes/nodes/add/blog.
Max CVSS
4.8
EPSS Score
0.06%
Published
2019-01-29
Updated
2019-01-29
A stored-self XSS exists in web/skins/classic/views/controlcaps.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a long NAME or PROTOCOL to the index.php?view=controlcaps URI.
Max CVSS
6.1
EPSS Score
0.07%
Published
2019-01-28
Updated
2019-01-29
A stored-self XSS exists in web/skins/classic/views/zones.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a crafted Zone NAME to the index.php?view=zones&action=zoneImage&mid=1 URI.
Max CVSS
5.4
EPSS Score
0.05%
Published
2019-01-28
Updated
2019-01-29
An issue was discovered in the User IP History Logs (aka IP_History_Logs) plugin 1.0.2 for MyBB. There is XSS via the admin/modules/tools/ip_history_logs.php useragent field.
Max CVSS
6.1
EPSS Score
0.10%
Published
2019-01-28
Updated
2019-01-29

CVE-2019-6804

Public exploit
An XSS issue was discovered on the Job Edit page in Rundeck Community Edition before 3.0.13, related to assets/javascripts/workflowStepEditorKO.js and views/execution/_wfitemEdit.gsp.
Max CVSS
6.1
EPSS Score
1.02%
Published
2019-01-25
Updated
2021-09-01
typora through 0.9.9.20.3 beta has XSS, with resultant remote command execution, via the left outline bar.
Max CVSS
6.1
EPSS Score
0.20%
Published
2019-01-25
Updated
2019-01-25
CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a %0d%0a in a URI.
Max CVSS
6.1
EPSS Score
0.11%
Published
2019-01-25
Updated
2021-07-21
An issue was discovered in ZoneMinder v1.32.3. Reflected XSS exists in web/skins/classic/views/plugin.php via the zm/index.php?view=plugin pl parameter.
Max CVSS
6.1
EPSS Score
0.08%
Published
2019-01-24
Updated
2019-01-24
XSS exists in JPress v1.0.4 via Markdown input, or Markdown input with the code input option.
Max CVSS
5.4
EPSS Score
0.06%
Published
2019-01-14
Updated
2019-01-18
The Premium WP Suite Easy Redirect Manager plugin 28.07-17 for WordPress has XSS via a crafted GET request that is mishandled during log viewing at the templates/admin/redirect-log.php URI.
Max CVSS
6.1
EPSS Score
0.16%
Published
2019-01-15
Updated
2019-01-17
An issue was discovered in Joomla! before 3.9.2. Inadequate escaping in mod_banners leads to a stored XSS vulnerability.
Max CVSS
6.1
EPSS Score
0.14%
Published
2019-01-16
Updated
2019-02-26
An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration Text Filter settings allowed stored XSS.
Max CVSS
4.8
EPSS Score
0.18%
Published
2019-01-16
Updated
2019-02-26
An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration helpurl settings allowed stored XSS.
Max CVSS
5.4
EPSS Score
0.07%
Published
2019-01-16
Updated
2019-02-26
An issue was discovered in Joomla! before 3.9.2. Inadequate escaping in com_contact leads to a stored XSS vulnerability.
Max CVSS
6.1
EPSS Score
0.14%
Published
2019-01-16
Updated
2019-02-26
PHP Scripts Mall Citysearch / Hotfrog / Gelbeseiten Clone Script 2.0.1 has Reflected XSS via the srch parameter, as demonstrated by restaurants-details.php.
Max CVSS
6.1
EPSS Score
0.07%
Published
2019-01-13
Updated
2019-01-17
Frog CMS 0.9.5 allows XSS via the forgot password page (aka the /admin/?/login/forgot URI).
Max CVSS
6.1
EPSS Score
0.09%
Published
2019-01-12
Updated
2019-01-16
An issue was discovered in YUNUCMS V1.1.8. app/index/controller/Show.php has an XSS vulnerability via the index.php/index/show/index cw parameter.
Max CVSS
6.1
EPSS Score
0.09%
Published
2019-01-04
Updated
2019-01-10
124 vulnerabilities found
1 2 3 4 5
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!