CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Security Vulnerabilities (Cross Site Scripting (XSS))

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2023-28884 XSS 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
In MISP 2.4.169, app/Lib/Tools/CustomPaginationTool.php allows XSS in the community index.
2 CVE-2023-28666 79 XSS 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The InPost Gallery WordPress plugin, in versions < 2.2.2, is affected by a reflected cross-site scripting vulnerability in the 'imgurl' parameter to the add_inpost_gallery_slide_item action, which can only be triggered by an authenticated user.
3 CVE-2023-28665 79 XSS 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The Woo Bulk Price Update WordPress plugin, in versions < 2.2.2, is affected by a reflected cross-site scripting vulnerability in the 'page' parameter to the techno_get_products action, which can only be triggered by an authenticated user.
4 CVE-2023-28664 79 XSS 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The Meta Data and Taxonomies Filter WordPress plugin, in versions < 1.3.1, is affected by a reflected cross-site scripting vulnerability in the 'tax_name' parameter of the mdf_get_tax_options_in_widget action, which can only be triggered by an authenticated user.
5 CVE-2023-28629 79 XSS 2023-03-27 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
GoCD is an open source continuous delivery server. GoCD versions before 23.1.0 are vulnerable to a stored XSS vulnerability, where pipeline configuration with a malicious pipeline label configuration can affect browser display of pipeline runs generated from that configuration. An attacker that has permissions to configure GoCD pipelines could include JavaScript elements within the label template, causing a XSS vulnerability to be triggered for any users viewing the Value Stream Map or Job Details for runs of the affected pipeline, potentially allowing them to perform arbitrary actions within the victim's browser context rather than their own. This issue has been fixed in GoCD 23.1.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
6 CVE-2023-28607 79 XSS 2023-03-18 2023-03-24
0.0
None ??? ??? ??? ??? ??? ???
js/event-graph.js in MISP before 2.4.169 allows XSS via the event-graph relationship tooltip.
7 CVE-2023-28606 79 XSS 2023-03-18 2023-03-24
0.0
None ??? ??? ??? ??? ??? ???
js/event-graph.js in MISP before 2.4.169 allows XSS via event-graph node tooltips.
8 CVE-2023-28447 79 Exec Code XSS 2023-03-28 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.
9 CVE-2023-28439 79 Exec Code XSS 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability has been discovered affecting Iframe Dialog and Media Embed packages. The vulnerability may trigger a JavaScript code after fulfilling special conditions: using one of the affected packages on a web page with missing proper Content Security Policy configuration; initializing the editor on an element and using an element other than `<textarea>` as a base; and destroying the editor instance. This vulnerability might affect a small percentage of integrators that depend on dynamic editor initialization/destroy mechanism. A fix is available in CKEditor4 version 4.21.0. In some rare cases, a security fix may be considered a breaking change. Starting from version 4.21.0, the Iframe Dialog plugin applies the `sandbox` attribute by default, which restricts JavaScript code execution in the iframe element. To change this behavior, configure the `config.iframe_attributes` option. Also starting from version 4.21.0, the Media Embed plugin regenerates the entire content of the embed widget by default. To change this behavior, configure the `config.embed_keepOriginalContent` option. Those who choose to enable either of the more permissive options or who cannot upgrade to a patched version should properly configure Content Security Policy to avoid any potential security issues that may arise from embedding iframe elements on their web page.
10 CVE-2023-28435 79 XSS 2023-03-24 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
Dataease is an open source data visualization and analysis tool. The permissions for the file upload interface is not checked so users who are not logged in can upload directly to the background. The file type also goes unchecked, users could upload any type of file. These vulnerabilities has been fixed in version 1.18.5.
11 CVE-2023-28429 79 XSS 2023-03-20 2023-03-23
0.0
None ??? ??? ??? ??? ??? ???
Pimcore is an open source data and experience management platform. Versions prior to 10.5.19 have an unsecured tooltip field in DataObject class definition. This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 10.5.19 or, as a workaround, apply the patch manually.
12 CVE-2023-28426 79 XSS Bypass 2023-03-20 2023-03-21
0.0
None ??? ??? ??? ??? ??? ???
savg-sanitizer is a PHP SVG/XML Sanitizer. A bypass has been found in versions prior to 0.16.0 that allows an attacker to upload an SVG with persistent cross-site scripting. HTML elements within CDATA needed to be sanitized correctly, as we were converting them to a textnode and therefore, the library wasn't seeing them as DOM elements. This issue is fixed in version 0.16.0. Any data within a CDATA node will now be sanitised using HTMLPurifier. The maintainers have also removed many of the HTML and MathML elements from the allowed element list, as without ForiegnObject, they're not legal within the SVG context. There are no known workarounds.
13 CVE-2023-28422 79 XSS 2023-03-23 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
Auth. (admin+) Stored Cross-site Scripting (XSS) vulnerability in MagePeople Team Event Manager and Tickets Selling Plugin for WooCommerce <= 3.8.6. versions.
14 CVE-2023-28332 79 XSS 2023-03-23 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.
15 CVE-2023-28331 79 XSS 2023-03-23 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.
16 CVE-2023-28158 79 +Priv XSS 2023-03-29 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Privilege escalation via stored XSS using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.
17 CVE-2023-28106 79 XSS 2023-03-16 2023-03-22
0.0
None ??? ??? ??? ??? ??? ???
Pimcore is an open source data and experience management platform. Prior to version 10.5.19, an attacker can use cross-site scripting to send a malicious script to an unsuspecting user. Users may upgrade to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually.
18 CVE-2023-28083 79 XSS 2023-03-22 2023-03-24
0.0
None ??? ??? ??? ??? ??? ???
A remote Cross-site Scripting vulnerability was discovered in HPE Integrated Lights-Out 6 (iLO 6), Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4). HPE has provided software updates to resolve this vulnerability in HPE Integrated Lights-Out.
19 CVE-2023-27905 79 XSS 2023-03-10 2023-03-15
0.0
None ??? ??? ??? ??? ??? ???
Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting.
20 CVE-2023-27898 79 XSS 2023-03-10 2023-03-16
0.0
None ??? ??? ??? ??? ??? ???
Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances.
21 CVE-2023-27711 79 Exec Code XSS 2023-03-16 2023-03-22
0.0
None ??? ??? ??? ??? ??? ???
Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code via the Comment Manager /admin/manage-comments.php component.
22 CVE-2023-27641 79 XSS 2023-03-05 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
The REPORT (after z but before a) parameter in wa.exe in L-Soft LISTSERV 16.5 before 17 allows an attacker to conduct XSS attacks via a crafted URL.
23 CVE-2023-27592 79 XSS 2023-03-17 2023-03-24
0.0
None ??? ??? ??? ??? ??? ???
Miniflux is a feed reader. Since v2.0.25, Miniflux will automatically proxy images served over HTTP to prevent mixed content errors. When an outbound request made by the Go HTTP client fails, the `html.ServerError` is returned unescaped without the expected Content Security Policy header added to valid responses. By creating an RSS feed item with the inline description containing an `<img>` tag with a `srcset` attribute pointing to an invalid URL like `http:a<script>alert(1)</script>`, we can coerce the proxy handler into an error condition where the invalid URL is returned unescaped and in full. This results in JavaScript execution on the Miniflux instance as soon as the user is convinced (e.g. by a message in the alt text) to open the broken image. An attacker can execute arbitrary JavaScript in the context of a victim Miniflux user when they open a broken image in a crafted RSS feed. This can be used to perform actions on the Miniflux instance as that user and gain administrative access to the Miniflux instance if it is reachable and the victim is an administrator. A patch is available in version 2.0.43. As a workaround sisable image proxy; default value is `http-only`.
24 CVE-2023-27494 79 XSS 2023-03-16 2023-03-23
0.0
None ??? ??? ??? ??? ??? ???
Streamlit, software for turning data scripts into web applications, had a cross-site scripting (XSS) vulnerability in versions 0.63.0 through 0.80.0. Users of hosted Streamlit app(s) were vulnerable to a reflected XSS vulnerability. An attacker could craft a malicious URL with Javascript payloads to a Streamlit app. The attacker could then trick the user into visiting the malicious URL and, if successful, the server would render the malicious javascript payload as-is, leading to XSS. Version 0.81.0 contains a patch for this vulnerability.
25 CVE-2023-27489 79 Exec Code XSS 2023-03-29 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Kiwi TCMS is an open source test management system for both manual and automated testing. Kiwi TCMS accepts SVG files uploaded by users which could potentially contain JavaScript code. If SVG images are viewed directly, i.e. not rendered in an HTML page, this JavaScript code could execute. This vulnerability has been fixed by configuring Kiwi TCMS to serve with the Content-Security-Policy HTTP header which blocks inline JavaScript in all modern browsers. This configuration change is provided in version 12.1 and users are advised to upgrade. Users unable to upgrade may set their Content-Security-Policy HTTP header manually.
26 CVE-2023-27474 79 Sql XSS 2023-03-06 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
Directus is a real-time API and App dashboard for managing SQL database content. Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL. An attacker could exploit this to email users urls to the servers domain but which may contain malicious code. The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list. Users are advised to upgrade. Users unable to upgrade may disable the custom reset URL allow list as a workaround.
27 CVE-2023-27472 79 Exec Code XSS 2023-03-06 2023-03-11
0.0
None ??? ??? ??? ??? ??? ???
quickentity-editor-next is an open source, system local, video game asset editor. In affected versions HTML tags in entity names are not sanitised (XSS vulnerability). Allows arbitrary code execution within the browser sandbox, among other things, simply from loading a file containing a script tag in any entity name. This issue has been patched in version 1.28.1 of the application. Users are advised to upgrade. There are no known workarounds for this vulnerability.
28 CVE-2023-27294 79 XSS 2023-02-28 2023-03-10
0.0
None ??? ??? ??? ??? ??? ???
Improper neutralization of input during web page generation allows an authenticated attacker with access to a restricted account to submit malicious Javascript as the description for a calendar event, which would then be executed in other users' browsers if they browse to that event. This could result in stealing session tokens from users with higher permission levels or forcing users to make actions without their knowledge.
29 CVE-2023-27293 79 XSS 2023-02-28 2023-03-09
0.0
None ??? ??? ??? ??? ??? ???
Improper neutralization of input during web page generation allows an unauthenticated attacker to submit malicious Javascript as the answer to a questionnaire which would then be executed when an authenticated user reviews the candidate's submission. This could be used to steal other users’ cookies and force users to make actions without their knowledge.
30 CVE-2023-27245 XSS 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
A cross-site scripting (XSS) vulnerability in File Management Project 1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field under the Edit User module.
31 CVE-2023-27242 79 XSS 2023-03-24 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
SourceCodester Loan Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Type parameter under the Edit Loan Types module.
32 CVE-2023-27241 XSS 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
SourceCodester Water Billing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the lastname text box under the Add Client module.
33 CVE-2023-27212 79 XSS 2023-03-09 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
A cross-site scripting (XSS) vulnerability in /php-opos/signup.php of Online Pizza Ordering System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the redirect parameter.
34 CVE-2023-27211 79 XSS 2023-03-09 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
A cross-site scripting (XSS) vulnerability in /admin/navbar.php of Online Pizza Ordering System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the page parameter.
35 CVE-2023-27208 79 XSS 2023-03-09 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
A cross-site scripting (XSS) vulnerability in /php-opos/login.php of Online Pizza Ordering System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the redirect parameter.
36 CVE-2023-27206 79 XSS 2023-03-09 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
A cross-site scripting (XSS) vulnerability in /kruxton/navbar.php of Best POS Management System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the page parameter.
37 CVE-2023-27131 79 Exec Code XSS 2023-03-16 2023-03-22
0.0
None ??? ??? ??? ??? ??? ???
Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code viathe Post Editorparameter.
38 CVE-2023-27130 79 Exec Code XSS 2023-03-16 2023-03-22
0.0
None ??? ??? ??? ??? ??? ???
Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code via an arbitrarily supplied URL parameter.
39 CVE-2023-27093 79 DoS XSS 2023-03-13 2023-03-16
0.0
None ??? ??? ??? ??? ??? ???
Cross Site Scripting vulnerability found in My-Blog allows attackers to cause a denial of service via the Post function.
40 CVE-2023-27070 79 XSS 2023-03-14 2023-03-21
0.0
None ??? ??? ??? ??? ??? ???
A stored cross-site scripting (XSS) vulnerability in TotalJS OpenPlatform commit b80b09d allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the platform name field.
41 CVE-2023-27069 79 XSS 2023-03-14 2023-03-22
0.0
None ??? ??? ??? ??? ??? ???
A stored cross-site scripting (XSS) vulnerability in TotalJS OpenPlatform commit b80b09d allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the account name field.
42 CVE-2023-27059 79 XSS 2023-03-16 2023-03-22
0.0
None ??? ??? ??? ??? ??? ???
A cross-site scripting (XSS) vulnerability in the Edit Group function of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit Group Name text field.
43 CVE-2023-27054 79 XSS 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
A cross-site scripting (XSS) vulnerability in MiroTalk P2P before commit f535b35 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter under the settings module.
44 CVE-2023-27008 XSS 2023-03-28 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
A Cross-site scripting (XSS) vulnerability in the function encrypt_password() in login.tmpl.php in ATutor 2.2.1 allows remote attackers to inject arbitrary web script or HTML via the token parameter.
45 CVE-2023-26982 XSS 2023-03-29 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Trudesk v1.2.6 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Tags parameter under the Create Ticket function.
46 CVE-2023-26958 XSS 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
Phpgurukul Park Ticketing Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via the Admin Name parameter.
47 CVE-2023-26955 79 XSS 2023-03-07 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Admin Group module.
48 CVE-2023-26954 79 XSS 2023-03-07 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the User Group module.
49 CVE-2023-26953 79 XSS 2023-03-07 2023-03-14
0.0
None ??? ??? ??? ??? ??? ???
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Administrator module.
50 CVE-2023-26952 79 XSS 2023-03-08 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Menu module.
Total number of vulnerabilities : 25550   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.