Security
Headlines
HeadlinesLatestCVEs

Tag

#xss

CVE-2022-3704: ¬ XSS within Route Error Page · Issue #46244 · rails/rails

A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319.

CVE
#xss#vulnerability#web#ruby
Dinstar FXO Analog VoIP Gateway DAG2000-16O Cross Site Scripting

Dinstar FXO Analog VoIP Gateway version DAG2000-16O suffers from a persistent cross site scripting vulnerability.

ERP Sankhya 4.13.x Cross Site Scripting

ERP Sankhya versions 4.13.x and below suffer from a cross site scripting vulnerability.

GHSA-4r9g-w48q-8jwm: HyperDown vulnerable to Cross-site Scripting

HyperDown is a markdown parser written for the Chinese website SegmentFault. Improper validation of the href attribute allows for Cross-site Scripting. At publication there are no patched versions, and no known workarounds.

CVE-2022-25849: Snyk Vulnerability Database | Snyk

The package joyqi/hyper-down from 0.0.0 are vulnerable to Cross-site Scripting (XSS) because the module of parse markdown does not filter the href attribute very well.

GHSA-c33w-pm52-mqvf: @dependencytrack/frontend vulnerable to Persistent Cross-Site-Scripting via Vulnerability Details

### Description Due to the common practice of providing vulnerability details in markdown format, the Dependency-Track frontend renders them using the JavaScript library [Showdown](https://github.com/showdownjs/showdown). Showdown [does not have any XSS countermeasures built in](https://github.com/showdownjs/showdown/wiki/Markdown's-XSS-Vulnerability-(and-how-to-mitigate-it)), and versions before 4.6.1 of the Dependency-Track frontend did not encode or sanitize Showdown's output. This made it possible for arbitrary JavaScript included in vulnerability details via HTML attributes to be executed in context of the frontend. ### Impact Actors with the `VULNERABILITY_MANAGEMENT` permission can exploit this weakness by creating or editing a custom vulnerability and providing XSS payloads in any of the following fields: * Description * Details * Recommendation * References The payload will be executed for users with the `VIEW_PORTFOLIO` permission when browsing to the modified vulnerabil...

CVE-2022-38162: Home

Reflected cross-site scripting (XSS) vulnerabilities in WithSecure through 2022-08-10) exists within the F-Secure Policy Manager due to an unvalidated parameter in the endpoint, which allows remote attackers to provide a malicious input.

CVE-2022-27913: Joomla! Developer Network

An issue was discovered in Joomla! 4.2.0 through 4.2.3. Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in various components.

CVE-2022-31468: OX App Suite Cross Site Scripting

OX App Suite through 8.2 allows XSS via an attachment or OX Drive content when a client uses the len or off parameter.

GHSA-373r-9mg8-3jc4: Apache Geode vulnerable to Cross-Site Scripting

Apache Geode versions up to 1.15.0 are vulnerable to a Cross-Site Scripting (XSS) via data injection when using Pulse web application to view Region entries.