In Plone 5.0 through 5.2.4, Editors are vulnerable to XSS in the folder contents view, if a Contributor has created a folder with a SCRIPT tag in the description field.
Max CVSS
5.4
EPSS Score
0.05%
Published
2021-06-30
Updated
2021-07-02
Stored cross-site scripting (XSS) in the embedded webserver of AKCP sensorProbe before SP480-20210624 enables remote authenticated attackers to introduce arbitrary JavaScript via the Sensor Description, Email (from/to/cc), System Name, and System Location fields.
Max CVSS
5.4
EPSS Score
0.12%
Published
2021-06-30
Updated
2021-07-06
Mermaid before 8.11.0 allows XSS when the antiscript feature is used.
Max CVSS
6.1
EPSS Score
0.08%
Published
2021-06-27
Updated
2021-07-01
PandoraFMS <=7.54 allows Stored XSS by placing a payload in the name field of a visual console. When a user or an administrator visits the console, the XSS payload will be executed.
Max CVSS
5.4
EPSS Score
0.08%
Published
2021-06-25
Updated
2021-09-14
SAS Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.
Max CVSS
5.4
EPSS Score
0.07%
Published
2021-06-25
Updated
2021-07-01
phpIPAM 1.4.3 allows Reflected XSS via app/dashboard/widgets/ipcalc-result.php and app/tools/ip-calculator/result.php of the IP calculator.
Max CVSS
6.1
EPSS Score
0.09%
Published
2021-06-23
Updated
2021-06-24
Cross Site Scripting (XSS) in Zammad 1.0.x up to 4.0.0 allows remote attackers to execute arbitrary web script or HTML via the User Avatar attribute.
Max CVSS
6.1
EPSS Score
0.11%
Published
2021-06-28
Updated
2021-07-02
Cross Site Scripting (XSS) in Zammad 1.0.x up to 4.0.0 allows remote attackers to execute arbitrary web script or HTML via multiple models that contain a 'note' field to store additional information.
Max CVSS
6.1
EPSS Score
0.11%
Published
2021-06-28
Updated
2021-07-01
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
Max CVSS
6.1
EPSS Score
0.08%
Published
2021-06-23
Updated
2021-06-29
Cross site scripting (XSS) vulnerability in Ice Hrm 29.0.0.OS, allows attackers to execute arbitrary code via the parameters to the /app/ endpoint.
Max CVSS
6.1
EPSS Score
0.08%
Published
2021-06-22
Updated
2021-06-25
CheckSec Canopy before 3.5.2 allows XSS attacks against the login page via the LOGIN_PAGE_DISCLAIMER parameter.
Max CVSS
4.8
EPSS Score
0.06%
Published
2021-06-18
Updated
2021-06-21
Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard.
Max CVSS
6.1
EPSS Score
0.23%
Published
2021-06-11
Updated
2021-06-21
Accela Civic Platform through 20.1 allows ssoAdapter/logoutAction.do successURL XSS. NOTE: the vendor states "there are configurable security flags and we are unable to reproduce them with the available information.
Max CVSS
6.1
EPSS Score
0.21%
Published
2021-06-09
Updated
2024-04-11
The Refined GitHub browser extension before 21.6.8 might allow XSS via a link in a document. NOTE: github.com sends Content-Security-Policy headers to, in general, address XSS and other concerns.
Max CVSS
6.1
EPSS Score
0.07%
Published
2021-06-09
Updated
2021-06-10
A stored cross site scripting (XSS) vulnerability was discovered in Ice Hrm 29.0.0.OS which allows attackers to execute arbitrary web scripts or HTML via a crafted file uploaded into the Document Management tab. The exploit is triggered when a user visits the upload location of the crafted file.
Max CVSS
5.4
EPSS Score
0.06%
Published
2021-06-22
Updated
2021-06-25
In Accela Civic Platform through 21.1, the security/hostSignon.do parameter servProvCode is vulnerable to XSS. NOTE: The vendor states "there are configurable security flags and we are unable to reproduce them with the available information.
Max CVSS
6.1
EPSS Score
0.18%
Published
2021-06-07
Updated
2024-04-11
A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled.
Max CVSS
6.1
EPSS Score
0.54%
Published
2021-06-09
Updated
2021-11-23
When SAP Commerce Cloud version 100, hosts a JavaScript storefront, it is vulnerable to MIME sniffing, which, in certain circumstances, could be used to facilitate an XSS attack or malware proliferation.
Max CVSS
6.1
EPSS Score
0.08%
Published
2021-06-09
Updated
2021-06-21
SAP NetWeaver Application Server ABAP (Applications based on SAP GUI for HTML), versions - KRNL64NUC - 7.49, KRNL64UC - 7.49,7.53, KERNEL - 7.49,7.53,7.77,7.81,7.84, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
Max CVSS
5.4
EPSS Score
0.05%
Published
2021-06-09
Updated
2021-06-16
SAP NetWeaver Application Server ABAP (Applications based on Web Dynpro ABAP), versions - SAP_UI - 750,752,753,754,755, SAP_BASIS - 702, 731 does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
Max CVSS
5.4
EPSS Score
0.05%
Published
2021-06-09
Updated
2021-06-16
An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.
Max CVSS
6.1
EPSS Score
0.11%
Published
2021-06-17
Updated
2021-06-21
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
Max CVSS
6.1
EPSS Score
0.09%
Published
2021-06-24
Updated
2021-06-30
An issue was discovered in JPress v3.3.0 and below. There are XSS vulnerabilities in the template module and tag management module. If you log in to the background by means of weak password, the storage XSS vulnerability can occur.
Max CVSS
5.4
EPSS Score
0.05%
Published
2021-06-18
Updated
2021-06-21
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper <script> tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.
Max CVSS
4.8
EPSS Score
0.10%
Published
2021-06-28
Updated
2021-07-02
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `<script>` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.
Max CVSS
5.4
EPSS Score
0.10%
Published
2021-06-28
Updated
2021-12-10
205 vulnerabilities found
1 2 3 4 5 6 7 8 9
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!