Cross-Site Scripting

Cross-Site Scripting (XSS) vulnerabilities allow attackers to inject malicious scripts into web pages viewed by other users. This can lead to session hijacking, credential theft, and phishing attacks.

Total CVEs

110

Typical Severity

MEDIUM

Category

General

Understanding Cross-Site Scripting

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Cross-Site Scripting CVEs (110)

DescriptionVendor / ProductExploit Status
CVE-2023-44516.1

This vulnerability allows an attacker to inject malicious scripts into a web page viewed by users of the cockpit application, potentially stealing sensitive information or performing actions on behalf of the user. It requires the attacker to trick a user into clicking a specially crafted link while using a vulnerable version of the software.

agentejocockpit
Exploit Available
over 2 years agoAug 20, 2023
CVE-2023-41455.4

This vulnerability allows an attacker to inject malicious scripts into the customer management framework, which can then be executed in the browsers of users who access the affected application. It requires the attacker to have the ability to input data into the system, making it particularly dangerous if user-generated content is not properly sanitized.

pimcorecustomer management framework
Exploit Available
over 2 years agoAug 3, 2023
CVE-2023-258378.4

This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by a victim, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, alter trusted content, or disrupt the application's normal operations.

esriportal for arcgis
Exploit Available
over 2 years agoJul 21, 2023
CVE-2023-258358.4

This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by another user, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, change site content, or disrupt the site’s normal operations, but it requires the attacker to already have elevated privileges within the system.

esriportal for arcgis
Theoretical
over 2 years agoJul 21, 2023
CVE-2023-293856.1

This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the WP Abstracts plugin, potentially stealing sensitive information or performing actions on behalf of users. It can be exploited without authentication, meaning anyone can trigger it simply by visiting a specially crafted link.

kevonadoniswp abstracts
Exploit Available
almost 3 years agoJun 12, 2023
CVE-2023-250234.8

This vulnerability allows an attacker with admin access to inject malicious scripts into the Webinar Ignition plugin, which can then execute when other users view the affected content. It requires the attacker to have administrative privileges, making it a risk primarily for organizations with compromised admin accounts.

saleswonderwebinarignition
Theoretical
about 3 years agoApr 7, 2023
CVE-2023-240014.8

This vulnerability allows an attacker with admin access to inject malicious scripts into the modal dialog plugin, which can then execute when other users interact with the affected site. It requires the attacker to have administrative privileges to exploit the flaw, making it a risk for sites where admin accounts could be compromised.

ylefebvremodal dialog
Theoretical
about 3 years agoApr 6, 2023
CVE-2023-247695.4

This vulnerability allows attackers to run harmful scripts on a user's browser by tricking them into clicking a specially crafted link when adding a new change detection watch. It requires the attacker to manipulate the URL, making it possible for them to target users of the affected software version before an update is applied.

webtechnologieschangedetection
Exploit Available
about 3 years agoFeb 17, 2023
CVE-2023-06766.1

This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the phpipam application, potentially stealing sensitive information like session cookies. It occurs when users click on specially crafted links, and it affects versions prior to 1.5.1.

phpipamphpipam
Exploit Available
about 3 years agoFeb 4, 2023
CVE-2023-04106.1

This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, potentially stealing sensitive information or performing actions on their behalf. It affects versions of the qwik product before 0.1.0-beta5, and an attacker would need to trick users into visiting a compromised page to exploit it.

qwikqwik
Exploit Available
about 3 years agoJan 20, 2023
CVE-2022-424624.8

This vulnerability allows an attacker to inject malicious scripts into the IP Blacklist Cloud plugin, which can then be executed in the browsers of users who have access to the plugin. To exploit this, the attacker must have authenticated access to the plugin, meaning they need to log in as a legitimate user.

ad33lxip blacklist cloud
Theoretical
about 3 years agoJan 17, 2023
CVE-2022-459705.4

This vulnerability allows an attacker to inject malicious scripts into the bulletin board feature of Alist, which could then run in the browsers of users visiting that page. To exploit this, the attacker needs to post a specially crafted message that tricks users into executing the harmful code.

alistgoalist
Theoretical
over 3 years agoDec 12, 2022
CVE-2022-44076.1

This vulnerability allows an attacker to inject malicious scripts into a web page viewed by users, potentially stealing their sensitive information or performing actions on their behalf. It affects versions of phpMyFAQ before 3.1.9 and requires the attacker to trick users into clicking on a specially crafted link.

phpmyfaqphpmyfaq
Exploit Available
over 3 years agoDec 11, 2022
CVE-2022-37666.1

This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the phpMyFAQ application, potentially stealing sensitive information like cookies or session tokens. It can be exploited when a user clicks on a specially crafted link, making it important for users to be cautious about the links they follow.

phpmyfaqphpmyfaq
Exploit Available
over 3 years agoOct 31, 2022
CVE-2022-265336.1

This vulnerability allows an attacker to inject malicious scripts into the Alist application, which could then run in the browsers of users who visit the affected page. To exploit this, the attacker needs to trick users into accessing a specially crafted URL that includes the harmful code.

alistgoalist
Theoretical
about 4 years agoMar 12, 2022
CVE-2021-251156.4

This vulnerability allows an attacker to inject malicious JavaScript code that can run in the admin panel of the WP Photo Album Plus plugin, potentially compromising the site. It can be exploited by any user, even those who are not logged in, simply by submitting harmful content that gets logged by the plugin.

wppawp photo album plus
Exploit Available
about 4 years agoFeb 14, 2022
CVE-2022-225296.1

An attacker can exploit a weakness in SAP Enterprise Threat Detection to inject malicious scripts into the user interface, potentially allowing them to steal sensitive information or perform actions on behalf of other users. This vulnerability arises because the system does not properly handle user inputs, and it mainly affects the web interfaces that rely on the SAP UI5 framework.

sapenterprise threat detection
Exploit Available
about 4 years agoJan 14, 2022
CVE-2021-413727.6

An attacker can upload a malicious Power BI template that includes harmful HTML files, which can then execute scripts in the context of a user’s session, potentially allowing the attacker to gain higher privileges if the victim has admin rights. This requires the victim to be tricked into accessing the malicious HTML files while logged into the Power BI Report Server.

microsoftpower bi report server
Theoretical
over 4 years agoNov 10, 2021
CVE-2021-354386.1

This vulnerability allows an attacker to inject malicious scripts into the IP calculator feature of phpIPAM, which can then execute in the browser of anyone who visits the affected pages. To exploit this, the attacker needs to trick users into clicking on a specially crafted link that leads to the vulnerable pages.

phpipamphpipam
Theoretical
almost 5 years agoJun 23, 2021
CVE-2015-93544.8

This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the gigpress plugin for WordPress, potentially stealing sensitive information or hijacking user sessions. It can be exploited if the attacker can input data into the plugin without proper validation, which could happen in forms or comments.

trigigpress
Exploit Available
over 6 years agoAug 28, 2019
Showing 81 to 100 of 110 results