Cross-Site Scripting
Cross-Site Scripting (XSS) vulnerabilities allow attackers to inject malicious scripts into web pages viewed by other users. This can lead to session hijacking, credential theft, and phishing attacks.
110
MEDIUM
General
Understanding Cross-Site Scripting
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Cross-Site Scripting CVEs (110)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2023-4451 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into a web page viewed by users of the cockpit application, potentially stealing sensitive information or performing actions on behalf of the user. It requires the attacker to trick a user into clicking a specially crafted link while using a vulnerable version of the software. | agentejocockpit | Exploit Available | over 2 years agoAug 20, 2023 |
| CVE-2023-4145 | 5.4 | This vulnerability allows an attacker to inject malicious scripts into the customer management framework, which can then be executed in the browsers of users who access the affected application. It requires the attacker to have the ability to input data into the system, making it particularly dangerous if user-generated content is not properly sanitized. | pimcorecustomer management framework | Exploit Available | over 2 years agoAug 3, 2023 |
| CVE-2023-25837 | 8.4 | This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by a victim, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, alter trusted content, or disrupt the application's normal operations. | esriportal for arcgis | Exploit Available | over 2 years agoJul 21, 2023 |
| CVE-2023-25835 | 8.4 | This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by another user, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, change site content, or disrupt the site’s normal operations, but it requires the attacker to already have elevated privileges within the system. | esriportal for arcgis | Theoretical | over 2 years agoJul 21, 2023 |
| CVE-2023-29385 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the WP Abstracts plugin, potentially stealing sensitive information or performing actions on behalf of users. It can be exploited without authentication, meaning anyone can trigger it simply by visiting a specially crafted link. | kevonadoniswp abstracts | Exploit Available | almost 3 years agoJun 12, 2023 |
| CVE-2023-25023 | 4.8 | This vulnerability allows an attacker with admin access to inject malicious scripts into the Webinar Ignition plugin, which can then execute when other users view the affected content. It requires the attacker to have administrative privileges, making it a risk primarily for organizations with compromised admin accounts. | saleswonderwebinarignition | Theoretical | about 3 years agoApr 7, 2023 |
| CVE-2023-24001 | 4.8 | This vulnerability allows an attacker with admin access to inject malicious scripts into the modal dialog plugin, which can then execute when other users interact with the affected site. It requires the attacker to have administrative privileges to exploit the flaw, making it a risk for sites where admin accounts could be compromised. | ylefebvremodal dialog | Theoretical | about 3 years agoApr 6, 2023 |
| CVE-2023-24769 | 5.4 | This vulnerability allows attackers to run harmful scripts on a user's browser by tricking them into clicking a specially crafted link when adding a new change detection watch. It requires the attacker to manipulate the URL, making it possible for them to target users of the affected software version before an update is applied. | webtechnologieschangedetection | Exploit Available | about 3 years agoFeb 17, 2023 |
| CVE-2023-0676 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the phpipam application, potentially stealing sensitive information like session cookies. It occurs when users click on specially crafted links, and it affects versions prior to 1.5.1. | phpipamphpipam | Exploit Available | about 3 years agoFeb 4, 2023 |
| CVE-2023-0410 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, potentially stealing sensitive information or performing actions on their behalf. It affects versions of the qwik product before 0.1.0-beta5, and an attacker would need to trick users into visiting a compromised page to exploit it. | qwikqwik | Exploit Available | about 3 years agoJan 20, 2023 |
| CVE-2022-42462 | 4.8 | This vulnerability allows an attacker to inject malicious scripts into the IP Blacklist Cloud plugin, which can then be executed in the browsers of users who have access to the plugin. To exploit this, the attacker must have authenticated access to the plugin, meaning they need to log in as a legitimate user. | ad33lxip blacklist cloud | Theoretical | about 3 years agoJan 17, 2023 |
| CVE-2022-45970 | 5.4 | This vulnerability allows an attacker to inject malicious scripts into the bulletin board feature of Alist, which could then run in the browsers of users visiting that page. To exploit this, the attacker needs to post a specially crafted message that tricks users into executing the harmful code. | alistgoalist | Theoretical | over 3 years agoDec 12, 2022 |
| CVE-2022-4407 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into a web page viewed by users, potentially stealing their sensitive information or performing actions on their behalf. It affects versions of phpMyFAQ before 3.1.9 and requires the attacker to trick users into clicking on a specially crafted link. | phpmyfaqphpmyfaq | Exploit Available | over 3 years agoDec 11, 2022 |
| CVE-2022-3766 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the phpMyFAQ application, potentially stealing sensitive information like cookies or session tokens. It can be exploited when a user clicks on a specially crafted link, making it important for users to be cautious about the links they follow. | phpmyfaqphpmyfaq | Exploit Available | over 3 years agoOct 31, 2022 |
| CVE-2022-26533 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into the Alist application, which could then run in the browsers of users who visit the affected page. To exploit this, the attacker needs to trick users into accessing a specially crafted URL that includes the harmful code. | alistgoalist | Theoretical | about 4 years agoMar 12, 2022 |
| CVE-2021-25115 | 6.4 | This vulnerability allows an attacker to inject malicious JavaScript code that can run in the admin panel of the WP Photo Album Plus plugin, potentially compromising the site. It can be exploited by any user, even those who are not logged in, simply by submitting harmful content that gets logged by the plugin. | wppawp photo album plus | Exploit Available | about 4 years agoFeb 14, 2022 |
| CVE-2022-22529 | 6.1 | An attacker can exploit a weakness in SAP Enterprise Threat Detection to inject malicious scripts into the user interface, potentially allowing them to steal sensitive information or perform actions on behalf of other users. This vulnerability arises because the system does not properly handle user inputs, and it mainly affects the web interfaces that rely on the SAP UI5 framework. | sapenterprise threat detection | Exploit Available | about 4 years agoJan 14, 2022 |
| CVE-2021-41372 | 7.6 | An attacker can upload a malicious Power BI template that includes harmful HTML files, which can then execute scripts in the context of a user’s session, potentially allowing the attacker to gain higher privileges if the victim has admin rights. This requires the victim to be tricked into accessing the malicious HTML files while logged into the Power BI Report Server. | microsoftpower bi report server | Theoretical | over 4 years agoNov 10, 2021 |
| CVE-2021-35438 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into the IP calculator feature of phpIPAM, which can then execute in the browser of anyone who visits the affected pages. To exploit this, the attacker needs to trick users into clicking on a specially crafted link that leads to the vulnerable pages. | phpipamphpipam | Theoretical | almost 5 years agoJun 23, 2021 |
| CVE-2015-9354 | 4.8 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the gigpress plugin for WordPress, potentially stealing sensitive information or hijacking user sessions. It can be exploited if the attacker can input data into the plugin without proper validation, which could happen in forms or comments. | trigigpress | Exploit Available | over 6 years agoAug 28, 2019 |