Security
Headlines
HeadlinesLatestCVEs

Tag

#xss

CVE-2022-4651

The Justified Gallery WordPress plugin before 1.7.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.

CVE
#xss#wordpress
CVE-2022-4649

The WP Extended Search WordPress plugin before 2.1.2 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.

PHPJabbers Car Park Booking System 2.0 Cross Site Scripting

PHPJabbers Car Park Booking System version 2.0 suffers from a cross site scripting vulnerability.

Zstore 6.6.0 Cross Site Scripting

Zstore version 6.6.0 suffers from a cross site scripting vulnerability.

PHPJabbers Event Ticketing System Script 1.0 Cross Site Scripting

PHPJabbers Event Ticketing System Script version 1.0 suffers from a cross site scripting vulnerability.

PHPJabbers Travel Tours Script 1.0 Cross Site Scripting

PHPJabbers Travel Tours Script version 1.0 suffers from a cross site scripting vulnerability.

PHPJabbers Property Listing Script 3.1 Cross Site Scripting

PHPJabbers Property Listing Script version 3.1 suffers from a cross site scripting vulnerability.

CVE-2022-46087: Advisory_G37SYS73M/poc.md at main · G37SYS73M/Advisory_G37SYS73M

CloudSchool v3.0.1 is vulnerable to Cross Site Scripting (XSS). A normal user can steal session cookies of the admin users through notification received by the admin user.

CVE-2023-22333: EasyMail vulnerable to cross-site scripting

Cross-site scripting vulnerability in EasyMail 2.00.130 and earlier allows a remote unauthenticated attacker to inject an arbitrary script.

CVE-2023-24065: GitHub - shihjay2/docker-nosh: NOSH ChartingSystem Dockerized

NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for health charting.