Tag
#xss
Unauthenticated remote code execution
A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. See the following Jenkins security advisory for details: * https://www.jenkins.io/security/advisory/2023-06-14/ https://www.jenkins.io/security/advisory/2023-06-14/
PaulPrinting CMS suffers from persistent cross site scripting vulnerabilities.
Webile version 1.0.1 suffers from multiple cross site scripting vulnerabilities.
Dooblou WiFi File Explorer version 1.13.3 suffers from multiple cross site scripting vulnerabilities.
PaulPrinting CMS suffers from a cross site scripting vulnerability.
Tiva Events Calender version 1.4 suffers from a persistent cross site scripting vulnerability.
Boom CMS version 8.0.7 suffers from a cross site scripting vulnerability.
Clip Share version 4.1.4 suffers from a cross site scripting vulnerability.
A vulnerability classified as problematic has been found in GZ Script Car Rental Script 1.8. Affected is an unknown function of the file /EventBookingCalendar/load.php?controller=GzFront/action=checkout/cid=1/layout=calendar/show_header=T/local=3. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234432. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.