Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-23127

Summary
Assigner-Mitsubishi
Assigner Org ID-e0f77b61-78fd-4786-b3fb-1ee347a748ad
Published At-21 Jan, 2022 | 18:17
Updated At-03 Aug, 2024 | 03:36
Rejected At-
Credits

Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Mitsubishi
Assigner Org ID:e0f77b61-78fd-4786-b3fb-1ee347a748ad
Published At:21 Jan, 2022 | 18:17
Updated At:03 Aug, 2024 | 03:36
Rejected At:
▼CVE Numbering Authority (CNA)

Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.

Affected Products
Vendor
n/a
Product
Mitsubishi Electric MC Works64; ICONICS MobileHMI
Versions
Affected
  • Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior
  • ICONICS MobileHMI versions 10.96.2 and prior
Problem Types
TypeCWE IDDescription
textN/ACross-site Scripting
Type: text
CWE ID: N/A
Description: Cross-site Scripting
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://jvn.jp/vu/JVNVU95403720/index.html
x_refsource_MISC
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf
x_refsource_MISC
https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01
x_refsource_MISC
Hyperlink: https://jvn.jp/vu/JVNVU95403720/index.html
Resource:
x_refsource_MISC
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf
Resource:
x_refsource_MISC
Hyperlink: https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://jvn.jp/vu/JVNVU95403720/index.html
x_refsource_MISC
x_transferred
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf
x_refsource_MISC
x_transferred
https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01
x_refsource_MISC
x_transferred
Hyperlink: https://jvn.jp/vu/JVNVU95403720/index.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Published At:21 Jan, 2022 | 19:15
Updated At:27 Jan, 2022 | 20:03

Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

iconics
iconics
>>mobilehmi>>Versions up to 10.96.2(inclusive)
cpe:2.3:a:iconics:mobilehmi:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mc_works64>>Versions before 10.95.210.01(exclusive)
cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://jvn.jp/vu/JVNVU95403720/index.htmlMitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Mitigation
Third Party Advisory
VDB Entry
https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Mitigation
Third Party Advisory
US Government Resource
VDB Entry
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdfMitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Mitigation
Vendor Advisory
Hyperlink: https://jvn.jp/vu/JVNVU95403720/index.html
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Resource:
Mitigation
Third Party Advisory
VDB Entry
Hyperlink: https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Resource:
Mitigation
Third Party Advisory
US Government Resource
VDB Entry
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Resource:
Mitigation
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

18906Records found

CVE-2022-33322
Matching Score-10
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-10
Assigner-Mitsubishi Electric Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.49% / 81.27%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-01 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-msz-ap25\/35\/42\/50\/60\/71vgk-er3_firmwaremsz-ay25\/35\/42\/50vgk-et1_firmwaremsz-ft25\/35\/50vgk-sc2_firmwaremsxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1mac-588if-ema-ew85s-uk_firmwaremsz-bt20\/25\/35\/50vgk-et2_firmwares-mac-002if_firmwaremsz-bt20\/25\/35\/50vgk-et3_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2_firmwaremsz-gzy09\/12\/18vfkmac-587if2-emsz-ap25\/35\/42\/50\/60\/71vgk-et3msz-ay25\/35\/42\/50vgkp-et1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e2_firmwaremsz-ln25\/35\/50\/60vg2v-er3msz-ln25\/35\/50vg2r-en2_firmwaremsz-ap25\/35\/42\/50vgk-en2msz-ft25\/35\/50vgk-sc1msz-ln25\/35\/50vg2r-en2msz-wx18\/20\/25vfk_firmwaremsy-gp10\/13\/15\/18\/20\/24vfk-sg1msz-ap25\/35\/42\/50vgk-er1_firmwarema-ew85s-emsz-bt20\/25\/35\/50vgk-er1msz-ln18\/25\/35\/50\/60vg2w-e2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er2msz-ln18\/25\/35\/50\/60vg2v-e3_firmwaremsz-ln25\/35\/50\/60vg2v-a2_firmwaremsz-ef22\/25\/35\/42\/50vgks-et1_firmwaremsz-rw25\/35\/50vg-sc1_firmwaremsz-bt20\/25\/35\/50vgk-et2msz-ln25\/35\/50\/60vg2v-er2msz-ln25\/35\/50vg2b-en2mac-507if-e_firmwaremsz-wx18\/20\/25vfkmac-507if-emsz-ln25\/35\/50\/60vg2r-et3msz-exa09\/12vakmsxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-et2msz-ef18\/22\/25\/35\/42\/50vgkb-e2_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e3msz-ay25\/35\/42\/50vgk-er1msz-ln25\/35\/50\/60vg2b-et3msz-ay25\/35\/42\/50vgk-e6_firmwaremsz-bt20\/25\/35\/50vgk-er2_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1_firmwaremsz-bt20\/25\/35\/50vgk-et1msz-ef22\/25\/35\/42\/50vgkw-et1_firmwaremac-588if-e_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-e1_firmwaremsz-rw25\/35\/50vg-et1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er2_firmwaremsz-bt20\/25\/35\/50vgk-e3_firmwaremsz-ay25\/35\/42\/50vgkp-er1msz-ef22\/25\/35\/42\/50vgkb-er1msz-ln25\/35\/50vg2v-sc1_firmwaremsz-ap25\/35\/42\/50vgk-er1msz-ap25\/35\/42\/50vgk-en3msz-ef22\/25\/35\/42\/50vgkb-et2_firmwaremsz-ef22\/25\/35\/42\/50vgks-er2msz-ln25\/35\/50vg2w-en2msz-ef22\/25\/35\/42\/50vgkw-a1_firmwaremsz-hr25\/35\/42\/50vfk-e6_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e2msz-ln18\/25\/35\/50\/60vg2r-e3_firmwaremsz-ln25\/35\/50\/60vg2r-er3msz-ln25\/35\/50\/60vg2w-et3_firmwaremsz-bt20\/25\/35\/50vgk-e2msz-ef22\/25\/35\/42\/50vgkb-et1msz-ay25\/35\/42\/50vgkp-sc1_firmwaremsz-bt20\/25\/35\/50vgk-e2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er1_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2msz-ln25\/35\/50\/60vg2r-er2_firmwaremsz-ln25\/35\/50\/60vg2r-a2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-et1_firmwaremsz-ft25\/35\/50vgk-et1msz-ft25\/35\/50vgk-e1_firmwaremsz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2_firmwaremsz-ap25\/35\/42\/50vgk-et1msz-ef22\/25\/35\/42\/50vgkb-a1msz-ft25\/35\/50vgk-sc2mfz-gxt50\/60\/73vfk_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-e3msz-hr25\/35\/42\/50\/60\/71vfk-er1msz-ln25\/35\/50vg2b-sc1msz-rw25\/35\/50vg-e1_firmwaremsz-rw25\/35\/50vg-e1msz-ln25\/35\/50\/60vg2w-et3mac-587if2-e_firmwaremsz-ln25\/35\/50\/60vg2v-et3_firmwaremsz-ay25\/35\/42\/50vgkp-e6msy-gp10\/13\/15\/18\/20\/24vfk-sg1_firmwaremsz-ap25\/35\/42\/50vgk-e7_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e1msz-ef22\/25\/35\/42\/50vgks-et2msz-ef22\/25\/35\/42\/50vgkw-et1msz-hr25\/35\/42\/50vfk-e6msz-ln25\/35\/50\/60vg2b-et2_firmwaremsz-ln25\/35\/50\/60vg2b-et3_firmwaremsz-ef22\/25\/35\/42\/50vgks-er2_firmwaremsz-ef22\/25\/35\/42\/50vgks-a1_firmwaremsz-ap25\/35\/42\/50vgk-en1_firmwaremsz-ay25\/35\/42\/50vgkp-e6_firmwaremsz-ln25\/35\/50\/60vg2r-er3_firmwaremsz-ln25\/35\/50\/60vg2r-et2msz-rw25\/35\/50vg-et1msz-bt20\/25\/35\/50vgk-e1_firmwaremsz-ln25\/35\/50\/60vg2b-er2msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2_firmwaremsz-ap25\/35\/42\/50vgk-e7msz-ay25\/35\/42\/50vgk-e6msz-ln18\/25\/35\/50\/60vg2b-e2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e1msz-ln25\/35\/50\/60vg2v-er3_firmwaremsz-ln25\/35\/50\/60vg2b-er3msz-ay25\/35\/42\/50vgk-e1_firmwaremfz-xt50\/60vfk_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e2msz-bt20\/25\/35\/50vgk-er2msz-ft25\/35\/50vgk-e2_firmwaremsz-ln25\/35\/50\/60vg2b-et2msz-ln25\/35\/50\/60vg2v-a2msz-gzy09\/12\/18vfk_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e2msz-ay25\/35\/42\/50vgk-et1msz-ln18\/25\/35\/50\/60vg2b-e3msz-ay25\/35\/42\/50vgkp-et1msz-ay25\/35\/42\/50vgk-sc1msz-ef22\/25\/35\/42\/50vgkw-a1msz-ef18\/22\/25\/35\/42\/50vgks-e1_firmwaremsz-eza09\/12vakmsz-ef22\/25\/35\/42\/50vgks-et1msz-ln25\/35\/50\/60vg2r-et2_firmwaremsz-ft25\/35\/50vgk-sc1_firmwaremsz-rw25\/35\/50vg-sc1msz-ln25\/35\/50\/60vg2r-et3_firmwaremsz-ln25\/35\/50vg2w-en2_firmwaremfz-xt50\/60vfkmsz-ap25\/35\/42\/50vgk-e8_firmwaremsz-ef22\/25\/35\/42\/50vgkw-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e3_firmwaremsz-ln25\/35\/50\/60vg2v-et2_firmwaremsz-ln25\/35\/50\/60vg2v-et3msz-bt20\/25\/35\/50vgk-et3mac-587if-e_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e1_firmwaremsz-ay25\/35\/42\/50vgk-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e3msz-ln25\/35\/50\/60vg2b-a2_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-et1_firmwares-mac-002ifmsz-ef22\/25\/35\/42\/50vgks-a1msz-ln25\/35\/50vg2r-sc1_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-et1mfz-gxt50\/60\/73vfkmsz-ap25\/35\/42\/50vgk-en1msz-ap25\/35\/42\/50vgk-e1msz-ap25\/35\/42\/50\/60\/71vgk-e3_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et2msz-ln25\/35\/50\/60vg2v-er2_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-e1msz-ef22\/25\/35\/42\/50vgkw-er2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-a1_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-et3_firmwaremsz-ef22\/25\/35\/42\/50vgkw-er1msz-ft25\/35\/50vgk-e2msz-ln25\/35\/50vg2v-en2_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2msz-ef18\/22\/25\/35\/42\/50vgkw-e2msz-ay25\/35\/42\/50vgkp-sc1msz-ln18\/25\/35\/50\/60vg2w-et2_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er2msz-ln25\/35\/50\/60vg2r-a2msz-ln25\/35\/50vg2b-sc1_firmwaremsz-bt20\/25\/35\/50vgk-e1msz-zy09\/12\/18vfkmsz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2msz-ln25\/35\/50\/60vg2w-er3ma-ew85s-ukmsz-ln25\/35\/50\/60vg2r-er2msz-ln18\/25\/35\/50\/60vg2w-e3msz-ap25\/35\/42\/50vgk-et1_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-er1_firmwaremsz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1_firmwaremsz-bt20\/25\/35\/50vgk-e3msz-rw25\/35\/50vg-er1_firmwaremsz-ln25\/35\/50\/60vg2w-er3_firmwaremsz-ln25\/35\/50\/60vg2b-er3_firmwarema-ew85s-e_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1msz-ln18\/25\/35\/50\/60vg2r-e2_firmwaremsz-ay25\/35\/42\/50vgk-e1msz-rw25\/35\/50vg-er1msz-ln25\/35\/50\/60vg2v-et2msz-ef22\/25\/35\/42\/50vgkw-et2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e2msz-ln18\/25\/35\/50vg2w-sc1_firmwaremsz-ap25\/35\/42\/50vgk-en3_firmwaremsz-ay25\/35\/42\/50vgk-sc1_firmwaremsz-ft25\/35\/50vgk-et1_firmwaremsz-ln25\/35\/50vg2v-en2msz-bt20\/25\/35\/50vgk-et1_firmwaremac-587if-emsz-ln25\/35\/50vg2v-sc1msz-ln18\/25\/35\/50\/60vg2v-e2msz-ky09\/12\/18vfkmsz-ef22\/25\/35\/42\/50vgks-et2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e3_firmwaremsz-ln25\/35\/50vg2r-sc1msz-ef22\/25\/35\/42\/50vgkb-er2_firmwaremsz-zy09\/12\/18vfk_firmwaremsz-ap25\/35\/42\/50vgk-e8msz-ln25\/35\/50\/60vg2b-er2_firmwaremsz-ap25\/35\/42\/50vgk-en2_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et2msz-ln25\/35\/50\/60vg2b-a2msz-ap25\/35\/42\/50vgk-e1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e2_firmwaremsz-ln25\/35\/50vg2b-en2_firmwaremsz-ft25\/35\/50vgk-e1msz-ln18\/25\/35\/50\/60vg2w-e2msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2_firmwaremsz-ay25\/35\/42\/50vgkp-er1_firmwaremsz-eza09\/12vak_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-er3msz-ln18\/25\/35\/50vg2w-sc1msz-ef22\/25\/35\/42\/50vgkw-er2msz-exa09\/12vak_firmwaremsz-bt20\/25\/35\/50vgk-er1_firmwaremsz-ky09\/12\/18vfk_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET1Air Conditioning MSZ-AY25/35/42/50VGKP-ER1Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E1Air Conditioning MSZ-EF22/25/35/42/50VGKS-ER2Air Conditioning MSZ-LN18/25/35/50/60VG2W-E3Air Conditioning MSZ-LN25/35/50/60VG2V-ER2Air Conditioning MSZ-LN25/35/50/60VG2R-ER2Remote control with Wi-Fi Interface RMCB-D6SE-TAir Conditioning MSZ-LN25/35/50/60VG2R-ET2Air Conditioning MSZ-AY25/35/42/50VGKP-SC1Air Conditioning MSZ-LN25/35/50/60VG2V-ET3Air Conditioning MSZ-LN18/25/35/50/60VG2B-E3Remote control with Wi-Fi Interface RMCB-F6SE-TAir Conditioning MSZ-BT20/25/35/50VGK-E2Wi-Fi Interface GT-RA2Air Conditioning MSZ-EZA09/12VAKWi-Fi Interface GT-RA1Air Conditioning MSZ-HR25/35/42/50VFK-E6Air Conditioning MSZ-LN25/35/50/60VG2R-A2Air Conditioning MSZ-ZY09/12/18VFKAir Conditioning MSZ-LN25/35/50/60VG2W-ET3Mitsubishi Electric HEMS control adapter P-HM04WAAir Conditioning MSZ-AY25/35/42/50VGK-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET2Air Conditioning MSZ-LN25/35/50/60VG2R-ER3Air Conditioning MSZ-AP25/35/42/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ER3Air Conditioning MSZ-LN25/35/50/60VG2B-A2Air Conditioning MSZ-LN25/35/50VG2R-EN2Air Conditioning MSZ-FD40/56/63/71/8022SSmart Switch P-10SWRCAir Conditioning MSZ-RW25/35/50VG-ER1Remote control with Wi-Fi Interface RMCB-H6SE-TAir Conditioning MSZ-LN25/35/50/60VG2V-ET2Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9020(S)Air Conditioning MSZ-AP25/35/42/50VGK-E7Air Conditioning MSZ-AP22/25/35/42/50/60/71/80VGKD-A2Air Conditioning MSZ-AY25/35/42/50VGK-E6Air Conditioning MSZ-LN18/25/35/50/60VG2R-E3Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ER1Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ET2Refrigerator MR-WXD52/60/70GAir Conditioning MSZ-LN25/35/50/60VG2W-ER3Air Conditioning MSZ-EF22/25/35/42/50VGKS-A1Wi-Fi Interface MAC-588IF-EAir Conditioning MSZ-KY09/12/18VFKAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ER3Air Conditioning MSZ-BT20/25/35/50VGK-ER2Air Conditioning MSZ-EF22/25/35/42/50VGKS-ER1Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9021(S)Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ER2Air Conditioning MSZ-LN18/25/35/50/60VG2W-ET2Air Conditioning MSZ-RW25/35/50VG-E1Air Conditioning MSZ-HXV25/28/40/56/63/71/8022SAir Conditioning MSZ-EF22/25/35/42/50VGKB-ER2Air Conditioning MSZ-BT20/25/35/50VGK-ET3Air Conditioning MSZ-AP25/35/42/50VGK-EN2Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9021(S)Air Conditioning MSZ-AY25/35/42/50VGK-ER1Wi-Fi Interface GT-HR1Rice cooker NJ-AWBX10Smart Switch P-1600SWRCRefrigerator MR-WZ55/61HAir Conditioning MSZ-FZV40/56/63/71/80/9020SAir Conditioning MSZ-LN18/25/35/50VG2W-SC1Air Purifier MA-EW85S-EBATHROOM THERMO VENTILATOR WD-240DK2-RCBATHROOM THERMO VENTILATOR V-241BZ5-RCAir Conditioning MSZ-LN18/25/35/50/60VG2B-E2Air Conditioning MSZ-LN25/35/50/60VG2V-A2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E3Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E2Air Conditioning MFZ-GXT50/60/73VFKAir Conditioning MSZ-LN18/25/35/50/60VG2W-E2Air Conditioning MSZ-EF22/25/35/42/50VGKW-A1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ET1Smart Switch P-04SWRCBATHROOM THERMO VENTILATOR V-241BZ-RCAir Conditioning MSZ-LN18/25/35/50/60VG2W-ER2Air Conditioning MSZ-AP22/25/35/42/50/61/70/80VGKD-A1Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9021E9(S)Air Conditioning MSZ-BT20/25/35/50VGK-ET2Air Conditioning MSZ-FZ40/56/63/71/80/9021SAir Conditioning MSZ-AP25/35/42/50VGK-EN1Air Conditioning MSZ-LN25/35/50VG2V-SC1Air Conditioning MSZ-FT25/35/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ET3Air Conditioning MSZ-AP25/35/42/50/60/71VGK-E3Air Conditioning MSZ-FT25/35/50VGK-E2Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9020E8(S)Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E1Air Conditioning MSZ-BT20/25/35/50VGK-E3HEMS adapter GT-HEM4Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E2Wi-Fi Interface MAC-900IFAir Conditioning MSZ-LN25/35/50VG2B-SC1Refrigerator MR-MZ54/60HAir Conditioning MSZ-EF18/22/25/35/42/50VGKB-E1Air Conditioning MSZ-EF22/25/35/42/50VGKB-ER1Air Conditioning MSZ-FZV40/56/63/71/80/9021SAir Conditioning MSZ-EF18/22/25/35/42/50VGKS-E2Wi-Fi Interface PAC-SK43MLAir Conditioning MSZ-BT20/25/35/50VGK-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER2Air Conditioning MSZ-LN25/35/50VG2W-EN2Air Conditioning MSZ-LN25/35/50/60VG2V-ER3Air Conditioning MSZ-LN25/35/50/60VG2R-ET3Air Conditioning MSZ-AY25/35/42/50VGK-SC1Air Conditioning MFZ-XT50/60VFKAir Conditioning MSZ-AP25/35/42/50VGK-EN3BATHROOM THERMO VENTILATOR WD-240DK-RCAir Conditioning MSZ-BT20/25/35/50VGK-ER1Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET2Air Purifier MA-EW85S-UKAir Conditioning MSZ-BT20/25/35/50VGK-E1Air Conditioning MSZ-WX18/20/25VFKAir Conditioning MSZ-AP25/35/42/50VGK-E8Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-E2Energy Recovery Ventilator VL-200ZMHSV3-RCWi-Fi Interface MAC-587IF2-EAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ET3Air Conditioning MSZ-VXV40/56/63/71/8022SAir Conditioning MSZ-LN25/35/50VG2R-SC1Air Conditioning MSZ-LN25/35/50/60VG2B-ER2Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER1Air Conditioning MSZ-EXA09/12VAKAir Conditioning MSZ-GZY09/12/18VFKAir Conditioning MSZ-LN25/35/50/60VG2B-ET2Wi-Fi Interface MAC-587IF-EAir Conditioning MSZ-AY25/35/42/50VGKP-ET1Air Conditioning MSZ-RW25/35/50VG-ET1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-E1Air Conditioning MSZ-LN18/25/35/50/60VG2R-E2Air Conditioning MSZ-FZ40/56/63/71/80/9020SAir Conditioning MSZ-EF22/25/35/42/50VGKB-A1Air Conditioning MSZ-AP25/35/42/50VGK-ER1Wi-Fi Interface MAC-507IF-EAir Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9020(S)Wi-Fi Interface S-MAC-002IFAir Conditioning MSZ-EF22/25/35/42/50VGKS-ET1Air Conditioning MSZ-FT25/35/50VGK-SC2Air Conditioning MSZ-LN25/35/50VG2V-EN2Air Conditioning MSZ-AY25/35/42/50VGK-E1Air Conditioning MSY-GP10/13/15/18/20/24VFK-SG1Air Conditioning MSZ-FT25/35/50VGK-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E2Air Conditioning MSZ-FT25/35/50VGK-SC1Air Conditioning MSZ-AY25/35/42/50VGKP-E6Refrigerator MR-MXD50/57GAir Conditioning MSZ-AP25/35/42/50VGK-ET1Wi-Fi Interface P-WA01Air Conditioning MSZ-ZD25/28/40/56/63/71/8022(S)Air Conditioning MSZ-RW25/35/50VG-SC1Air Conditioning MSXY-FP05/07/10/13/18/20/24VGK-SG1Air Conditioning MSZ-LN25/35/50VG2B-EN2
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-16061
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.46% / 81.03%
||
7 Day CHG~0.00%
Published-15 Oct, 2021 | 19:04
Updated-11 Sep, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mitsubishi Electric Europe B.V. SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-smartrtusmartrtu_firmwaren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-20590
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.20%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 18:54
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in GOT2000 series GT27 model VNC server versions 01.39.010 and prior, GOT2000 series GT25 model VNC server versions 01.39.010 and prior, GOT2000 series GT21 model GT2107-WTBD VNC server versions 01.40.000 and prior, GOT2000 series GT21 model GT2107-WTSD VNC server versions 01.40.000 and prior, GOT SIMPLE series GS21 model GS2110-WTBD-N VNC server versions 01.40.000 and prior and GOT SIMPLE series GS21 model GS2107-WTBD-N VNC server versions 01.40.000 and prior allows a remote unauthenticated attacker to gain unauthorized access via specially crafted packets when the "VNC server" function is used.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-gt2107-wtbd_firmwaregt2107-wtsd_firmwaregs2110-wtbd-ngs2107-wtbd-ngot2000_gt25_firmwaregot2000_gt27_firmwaregot2000_gt25gt2107-wtbdgs2107-wtbd-n_firmwaregot2000_gt27gt2107-wtsdgs2110-wtbd-n_firmwareGOT2000 series GT25 modelGOT2000 series GT21 model GT2107-WTSDGOT SIMPLE series GS21 model GS2107-WTBD-NGOT SIMPLE series GS21 model GS2110-WTBD-NGOT2000 series GT27 modelGOT2000 series GT21 model GT2107-WTBD
CWE ID-CWE-287
Improper Authentication
CVE-2019-14928
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.4||MEDIUM
EPSS-2.07% / 84.14%
||
7 Day CHG~0.00%
Published-28 Oct, 2019 | 12:09
Updated-10 Sep, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. A number of stored cross-site script (XSS) vulnerabilities allow an attacker to inject malicious code directly into the application. An example input variable vulnerable to stored XSS is SerialInitialModemString in the index.php page.

Action-Not Available
Vendor-inean/aMitsubishi Electric Corporation
Product-me-rtume-rtu_firmwaresmartrtusmartrtu_firmwaren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-36745
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.02% / 3.60%
||
7 Day CHG~0.00%
Published-30 Aug, 2022 | 21:27
Updated-03 Aug, 2024 | 10:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LibreNMS v22.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component print-customoid.php.

Action-Not Available
Vendor-n/aLibreNMS
Product-librenmsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-7051
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.28% / 51.67%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 15:43
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Codologic Codoforum through 4.8.4 allows stored XSS in the login area. This is relevant in conjunction with CVE-2020-5842 because session cookies lack the HttpOnly flag. The impact is account takeover.

Action-Not Available
Vendor-codologicn/a
Product-codoforumn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6301
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.17% / 37.58%
||
7 Day CHG~0.00%
Published-26 Nov, 2023 | 23:31
Updated-02 Aug, 2024 | 08:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Best Courier Management System GET Parameter parcel_list.php cross site scripting

A vulnerability has been found in SourceCodester Best Courier Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246127.

Action-Not Available
Vendor-mayuri_kSourceCodester
Product-best_courier_management_systemBest Courier Management System
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6217
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.37% / 58.72%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 19:41
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP NetWeaver AS ABAP Business Server Pages Test Application IT00, versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability.

Action-Not Available
Vendor-SAP SE
Product-netweaver_as_abap_business_server_pagesSAP NetWeaver AS ABAP (Business Server Pages Test Application IT05)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-0285
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.42% / 62.33%
||
7 Day CHG-0.11%
Published-24 Jan, 2012 | 15:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Stoneware webNetwork before 6.0.8.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-stone-waren/a
Product-webnetworkn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6872
Matching Score-4
Assigner-ZTE Corporation
ShareView Details
Matching Score-4
Assigner-ZTE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.42% / 62.14%
||
7 Day CHG~0.00%
Published-20 Jul, 2020 | 17:02
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The server management software module of ZTE has a storage XSS vulnerability. The attacker inserts some attack codes through the foreground login page, which will cause the user to execute the predefined malicious script in the browser. This affects <R5300G4V03.08.0100/V03.07.0300/V03.07.0200/V03.07.0108/V03.07.0100/V03.05.0047/V03.05.0046/V03.05.0045/V03.05.0044/V03.05.0043/V03.05.0040/V03.04.0020;R8500G4V03.07.0103/V03.07.0101/V03.06.0100/V03.05.0400/V03.05.0020;R5500G4V03.08.0100/V03.07.0200/V03.07.0100/V03.06.0100>.

Action-Not Available
Vendor-n/aZTE Corporation
Product-r8500g4_firmwarer5500g4_firmwarer5300g4r5300g4_firmwarer8500g4r5500g4<R5300G4?R8500G4?R5500G4>
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-5027
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.44% / 63.44%
||
7 Day CHG~0.00%
Published-29 Dec, 2011 | 22:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler.

Action-Not Available
Vendor-n/aZABBIX
Product-zabbixn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-25097
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.07% / 21.00%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 15:31
Updated-06 Sep, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Acumos Design Studio cross site scripting

A vulnerability, which was classified as problematic, was found in Acumos Design Studio up to 2.0.7. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.0.8 is able to address this issue. The name of the patch is 0df8a5e8722188744973168648e4c74c69ce67fd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249420.

Action-Not Available
Vendor-Acumos AI (The Linux Foundation)
Product-design_studioDesign Studio
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-47146
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-7.1||HIGH
EPSS-0.29% / 52.25%
||
7 Day CHG~0.00%
Published-27 Mar, 2023 | 14:00
Updated-28 Apr, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Real Estate 7 Theme <= 3.3.1 is vulnerable to Cross Site Scripting (XSS)

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Contempoinc Real Estate 7 WordPress theme <= 3.3.1 versions.

Action-Not Available
Vendor-contempothemesContempoinc
Product-real_estate_7Real Estate 7 WordPress
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4782
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.47% / 65.04%
||
7 Day CHG~0.00%
Published-22 Dec, 2011 | 20:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in libraries/config/ConfigFile.class.php in the setup interface in phpMyAdmin 3.4.x before 3.4.9 allows remote attackers to inject arbitrary web script or HTML via the host parameter.

Action-Not Available
Vendor-n/aphpMyAdmin
Product-phpmyadminn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6632
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.84%
||
7 Day CHG~0.00%
Published-09 Jan, 2020 | 01:23
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PrestaShop 1.7.6.2, XSS can occur during addition or removal of a QuickAccess link. This is related to AdminQuickAccessesController.php, themes/default/template/header.tpl, and themes/new-theme/js/header.js.

Action-Not Available
Vendor-n/aPrestaShop S.A
Product-prestashopn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6254
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.19% / 40.63%
||
7 Day CHG~0.00%
Published-12 May, 2020 | 17:57
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Enterprise Threat Detection, versions 1.0, 2.0, does not sufficiently encode error response pages in case of errors, allowing XSS payload reflecting in the response, leading to reflected Cross Site Scripting.

Action-Not Available
Vendor-SAP SE
Product-enterprise_threat_detectionSAP Enterprise Threat Detection
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6558
Matching Score-4
Assigner-Chrome
ShareView Details
Matching Score-4
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-0.52% / 67.10%
||
7 Day CHG~0.00%
Published-21 Sep, 2020 | 19:06
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient policy enforcement in iOSWeb in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.

Action-Not Available
Vendor-Google LLCopenSUSEApple Inc.Debian GNU/Linux
Product-iphone_osdebian_linuxchromebackports_sleleapChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5958
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-0.78% / 73.86%
||
7 Day CHG~0.00%
Published-27 Nov, 2023 | 16:22
Updated-04 Jun, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
POST SMTP Mailer < 2.7.1 - Unauthenticated Cross-site Scripting

The POST SMTP Mailer WordPress plugin before 2.7.1 does not escape email message content before displaying it in the backend, allowing an unauthenticated attacker to perform XSS attacks against highly privileged users.

Action-Not Available
Vendor-wpexpertsUnknown
Product-post_smtpPOST SMTP Mailer
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-54349
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-5.1||MEDIUM
EPSS-0.07% / 20.26%
||
7 Day CHG~0.00%
Published-05 May, 2026 | 11:24
Updated-05 May, 2026 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AmazCart CMS 3.4 Reflected Cross-Site Scripting via Search

AmazCart CMS 3.4 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by submitting payloads through the search functionality. Attackers can enter script tags in the search box to execute arbitrary JavaScript that fires when search history is viewed or results are displayed.

Action-Not Available
Vendor-Spondonit
Product-AmazCart CMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6229
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.57%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 18:20
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP NetWeaver AS ABAP (Business Server Pages application CRM_BSP_FRAME), versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 75A, 75B, 75C, 75D, 75E, does not sufficiently encode user controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability.

Action-Not Available
Vendor-SAP SE
Product-netweaver_as_abap_business_server_pagesSAP NetWeaver AS ABAP (Business Server Pages application CRM_BSP_FRAME)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-36080
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 48.00%
||
7 Day CHG~0.00%
Published-07 Sep, 2022 | 21:00
Updated-23 Apr, 2025 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wikmd Cross-site Scripting vulnerability

Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, an attacker could capture user's session cookies or execute malicious Javascript when a victim edits a markdown file. Version 1.7.1 fixes this issue.

Action-Not Available
Vendor-wikmd_projectLinbreux
Product-wikmdwikmd
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6845
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.23% / 46.23%
||
7 Day CHG~0.00%
Published-18 Feb, 2020 | 14:17
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in TopManage OLK 2020. As there is no ReadOnly on the Session cookie, the user and admin accounts can be taken over in a DOM-Based XSS attack.

Action-Not Available
Vendor-topmanagen/a
Product-olk_webstoren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-45838
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.1||MEDIUM
EPSS-0.29% / 52.41%
||
7 Day CHG~0.00%
Published-18 Apr, 2023 | 12:11
Updated-28 Apr, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress ARForms Form Builder Plugin <= 1.5.5 is vulnerable to Cross Site Scripting (XSS)

Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Repute InfoSystems ARForms Form Builder plugin <= 1.5.5 versions.

Action-Not Available
Vendor-reputeinfosystemsRepute InfoSystems
Product-arforms_form_builderARForms Form Builder
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6163
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.84%
||
7 Day CHG~0.00%
Published-08 Jan, 2020 | 01:45
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WikibaseMediaInfo extension 1.35 for MediaWiki allows XSS because of improper template syntax within the PropertySuggestionsWidget template (in the templates/search/PropertySuggestionsWidget.mustache+dom file).

Action-Not Available
Vendor-n/aWikimedia Foundation
Product-mediawikin/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6123
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.5||HIGH
EPSS-0.51% / 66.61%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 21:04
Updated-18 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Neutralization vulnerability affects OpenText ALM Octane.

Improper Neutralization vulnerability affects OpenText ALM Octane version 16.2.100 and above. The vulnerability could result in a remote code execution attack.

Action-Not Available
Vendor-Open Text Corporation
Product-alm_octaneALM Octane.alm_octane
CWE ID-CWE-707
Improper Neutralization
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5837
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.06% / 19.77%
||
7 Day CHG~0.00%
Published-28 Oct, 2023 | 21:31
Updated-27 Aug, 2024 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AlexanderLivanov FotosCMS2 Cookie profile.php cross site scripting

A vulnerability classified as problematic was found in AlexanderLivanov FotosCMS2 up to 2.4.3. This vulnerability affects unknown code of the file profile.php of the component Cookie Handler. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243802 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-alexanderlivanovAlexanderLivanov
Product-fotoscms2FotosCMS2
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5641
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-0.12% / 29.96%
||
7 Day CHG~0.00%
Published-27 Nov, 2023 | 16:22
Updated-02 Aug, 2024 | 08:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Martins Free & Easy SEO Link buildings < 1.2.30 - Reflected XSS

The Martins Free & Easy SEO BackLink Link Building Network WordPress plugin before 1.2.30 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Action-Not Available
Vendor-martinstoolsUnknown
Product-free_\&_easy_link_buildingMartins Free & Easy SEO BackLink Link Building Network
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-14580
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 4.78%
||
7 Day CHG~0.00%
Published-12 Dec, 2025 | 20:32
Updated-24 Feb, 2026 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qualitor viewDocumento.php cross site scripting

A security vulnerability has been detected in Qualitor up to 8.24.73. The impacted element is an unknown function of the file /Qualitor/html/bc/bcdocumento9/biblioteca/request/viewDocumento.php. Such manipulation of the argument cdscript leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. It is suggested to upgrade the affected component. The vendor confirms the existence of the issue: "We became aware of the issue through an earlier direct notification from the original reporter, and our engineering team promptly investigated and implemented the necessary corrective measures. (...) Updated versions containing the fix have already been provided to our customer base".

Action-Not Available
Vendor-qualitorn/a
Product-qualitorQualitor
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-54362
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-5.1||MEDIUM
EPSS-0.04% / 10.77%
||
7 Day CHG~0.00%
Published-09 Apr, 2026 | 20:54
Updated-13 Apr, 2026 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Joomla VirtueMart Shopping-Cart 4.0.12 Reflected XSS via keyword

Joomla VirtueMart Shopping-Cart 4.0.12 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the keyword parameter. Attackers can craft malicious URLs containing script payloads in the keyword parameter of the product-variants endpoint to execute arbitrary JavaScript in victim browsers and steal session tokens or credentials.

Action-Not Available
Vendor-Virtuemart
Product-Cart
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-14962
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 10.16%
||
7 Day CHG-0.04%
Published-19 Dec, 2025 | 18:32
Updated-24 Feb, 2026 | 06:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Simple Stock System chatuser.php cross site scripting

A flaw has been found in code-projects Simple Stock System 1.0. The impacted element is an unknown function of the file /market/chatuser.php. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used.

Action-Not Available
Vendor-carmeloSource Code & Projects
Product-simple_stock_systemSimple Stock System
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-6758
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.31% / 54.52%
||
7 Day CHG~0.00%
Published-09 Jan, 2020 | 22:10
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) vulnerability in Option/optionsAll.php in Rasilient PixelStor 5000 K:4.0.1580-20150629 (KDI Version) allows remote attackers to inject arbitrary web script or HTML via the ContentFrame parameter.

Action-Not Available
Vendor-rasilientn/a
Product-pixelstor_5000_firmwarepixelstor_5000n/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2015-3439
Matching Score-4
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-4
Assigner-Debian GNU/Linux
CVSS Score-4.3||MEDIUM
EPSS-3.12% / 87.00%
||
7 Day CHG~0.00%
Published-05 Aug, 2015 | 10:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the Ephox (formerly Moxiecode) plupload.flash.swf shim 2.1.2 in Plupload, as used in WordPress 3.9.x, 4.0.x, and 4.1.x before 4.1.2 and other products, allows remote attackers to execute same-origin JavaScript functions via the target parameter, as demonstrated by executing a certain click function, related to _init.as and _fireEvent.as.

Action-Not Available
Vendor-n/aDebian GNU/LinuxWordPress.org
Product-debian_linuxwordpressn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4910
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 9.54%
||
7 Day CHG~0.00%
Published-07 Oct, 2012 | 21:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Joomla! before 1.5.12 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.

Action-Not Available
Vendor-n/aJoomla!
Product-joomla\!n/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5695
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.10% / 26.11%
||
7 Day CHG~0.00%
Published-22 Oct, 2023 | 22:31
Updated-02 Aug, 2024 | 08:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CodeAstro Internet Banking System pages_reset_pwd.php cross site scripting

A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file pages_reset_pwd.php. The manipulation of the argument email with the input testing%40example.com'%26%25<ScRiPt%20>alert(9860)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243133 was assigned to this vulnerability.

Action-Not Available
Vendor-martmbithiCodeAstro
Product-internet_banking_systemInternet Banking System
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-4710
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.44% / 85.34%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 16:55
Updated-08 Apr, 2026 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Royal Elementor Addons <= 1.3.59 - Reflected Cross-Site Scripting

The Royal Elementor Addons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.3.59, due to due to insufficient input sanitization and output escaping of the 'wpr_ajax_search_link_target' parameter in the 'data_fetch' function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is occurring because 'sanitize_text_field' is insufficient to prevent attribute-based Cross-Site Scripting

Action-Not Available
Vendor-Royal Elementor Addons
Product-royal_elementor_addonsRoyal Addons for Elementor – Addons and Templates Kit for Elementor
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6282
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-5.4||MEDIUM
EPSS-0.08% / 22.66%
||
7 Day CHG~0.00%
Published-25 Jan, 2024 | 11:37
Updated-18 Oct, 2024 | 15:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-Site Scripting vulnerability in IceHrm

IceHrm 23.0.0.OS does not sufficiently encode user-controlled input, which creates a Cross-Site Scripting (XSS) vulnerability via /icehrm/app/fileupload_page.php, in multiple parameters. An attacker could exploit this vulnerability by sending a specially crafted JavaScript payload and partially hijacking the victim's browser.

Action-Not Available
Vendor-icehrmIceHrm
Product-icehrmIceHrm
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6583
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.84%
||
7 Day CHG~0.00%
Published-08 Jan, 2020 | 19:06
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BigProf Online Invoicing System (OIS) through 2.6 has XSS that can be leveraged for session hijacking. An attacker can exploit the XSS vulnerability, retrieve the session cookie from the administrator login, and take over the administrator account via the Name field in an Add New Client action.

Action-Not Available
Vendor-n/aBigProf Software
Product-online_invoicing_systemn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-25119
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-5.1||MEDIUM
EPSS-0.38% / 59.29%
||
7 Day CHG~0.00%
Published-30 Oct, 2025 | 21:21
Updated-17 Nov, 2025 | 21:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nagios Fusion < 4.1.5 XSS via fusionwindow Parameter

Nagios Fusion versions prior to 4.1.5 are vulnerable to cross-site scripting (XSS) via the "fusionwindow" parameter. Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.

Action-Not Available
Vendor-Nagios Enterprises, LLC
Product-fusionFusion
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6002
Matching Score-4
Assigner-Yugabyte, Inc.
ShareView Details
Matching Score-4
Assigner-Yugabyte, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 36.08%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 23:56
Updated-17 Sep, 2024 | 13:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Log Injection

YugabyteDB is vulnerable to cross site scripting (XSS) via log injection. Writing invalidated user input to log files can allow an unprivileged attacker to forge log entries or inject malicious content into the logs.

Action-Not Available
Vendor-yugabyteYugabyteDB
Product-yugabytedbYugabyteDB
CWE ID-CWE-117
Improper Output Neutralization for Logs
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5930
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.07% / 21.28%
||
7 Day CHG~0.00%
Published-02 Nov, 2023 | 20:00
Updated-27 Feb, 2025 | 20:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Campcodes Simple Student Information System manage_academic.php cross site scripting

A vulnerability was found in Campcodes Simple Student Information System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/students/manage_academic.php. The manipulation of the argument student_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-244330 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-oretnom23CampCodes
Product-simple_student_information_systemSimple Student Information System
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4562
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.51% / 66.61%
||
7 Day CHG+0.11%
Published-28 Nov, 2011 | 21:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in (1) view/admin/log_item.php and (2) view/admin/log_item_details.php in the Redirection plugin 2.2.9 for WordPress allow remote attackers to inject arbitrary web script or HTML via the Referer HTTP header in a request to a post that does not exist.

Action-Not Available
Vendor-john_godleyn/aWordPress.org
Product-redirection_pluginwordpressn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6297
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.3||MEDIUM
EPSS-0.18% / 39.73%
||
7 Day CHG~0.00%
Published-26 Nov, 2023 | 22:31
Updated-03 Jun, 2025 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PHPGurukul Nipah Virus Testing Management System Search Report Page patient-search-report.php cross site scripting

A vulnerability classified as problematic has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file patient-search-report.php of the component Search Report Page. The manipulation of the argument Search By Patient Name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246123.

Action-Not Available
Vendor-PHPGurukul LLP
Product-nipah_virus_testing_management_systemNipah Virus Testing Management System
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-46843
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-7.1||HIGH
EPSS-0.20% / 41.76%
||
7 Day CHG~0.00%
Published-27 Mar, 2023 | 13:55
Updated-28 Apr, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Woocommerce Vietnam Checkout Plugin <= 2.0.4 is vulnerable to Cross Site Scripting (XSS)

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Le Van Toan Woocommerce Vietnam Checkout plugin <= 2.0.4 versions.

Action-Not Available
Vendor-levantoanLe Van Toan
Product-woocommerce_vietnam_checkoutWoocommerce Vietnam Checkout
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6300
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.17% / 37.58%
||
7 Day CHG~0.00%
Published-26 Nov, 2023 | 23:31
Updated-10 Oct, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Best Courier Management System cross site scripting

A vulnerability, which was classified as problematic, was found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function. The manipulation of the argument page with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246126 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-mayuri_kSourceCodester
Product-best_courier_management_systemBest Courier Management System
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-24389
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-13.89% / 94.39%
||
7 Day CHG~0.00%
Published-06 Jul, 2021 | 11:03
Updated-03 Aug, 2024 | 19:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FoodBakery < 2.2 - Reflected Cross-Site Scripting (XSS)

The WP Foodbakery WordPress plugin before 2.2, used in the FoodBakery WordPress theme before 2.2 did not properly sanitize the foodbakery_radius parameter before outputting it back in the response, leading to an unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability.

Action-Not Available
Vendor-chimpgroupChimpstudio
Product-foodbakeryWP FoodbakeryFoodBakery
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5631
Matching Score-4
Assigner-ESET, spol. s r.o.
ShareView Details
Matching Score-4
Assigner-ESET, spol. s r.o.
CVSS Score-6.1||MEDIUM
EPSS-84.19% / 99.32%
||
7 Day CHG-0.23%
Published-18 Oct, 2023 | 14:51
Updated-30 Oct, 2025 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-11-16||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Stored XSS vulnerability in Roundcube

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.

Action-Not Available
Vendor-Fedora ProjectDebian GNU/LinuxRoundcube Webmail Project
Product-fedoradebian_linuxwebmailRoundcubemailWebmail
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-1012
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.32% / 55.12%
||
7 Day CHG~0.00%
Published-05 Jun, 2013 | 10:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 6.0.5 allows remote attackers to inject arbitrary web script or HTML via vectors involving IFRAME elements.

Action-Not Available
Vendor-n/aApple Inc.
Product-safarin/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6275
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-52.49% / 97.97%
||
7 Day CHG~0.00%
Published-24 Nov, 2023 | 15:00
Updated-03 Jun, 2025 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TOTVS Fluig Platform mobileredir openApp.jsp cross site scripting

A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.1-231128, 1.8.0-231127 and 1.8.1-231127 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104.

Action-Not Available
Vendor-totvsTOTVS
Product-fluigFluig Platform
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6323
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.36% / 58.20%
||
7 Day CHG~0.00%
Published-15 Oct, 2020 | 01:45
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP NetWeaver Enterprise Portal (Fiori Framework Page) versions - 7.50, 7.31, 7.40, does not sufficiently encode user-controlled inputs and allows an attacker on a valid session to create an XSS that will be both reflected immediately and also be persisted and returned in further access to the system, resulting in Cross Site Scripting.

Action-Not Available
Vendor-SAP SE
Product-netweaver_enterprise_portalSAP NetWeaver Enterprise Portal (Fiori Framework Page)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5694
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.07% / 21.28%
||
7 Day CHG~0.00%
Published-22 Oct, 2023 | 22:00
Updated-02 Aug, 2024 | 08:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CodeAstro Internet Banking System pages_system_settings.php cross site scripting

A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been classified as problematic. Affected is an unknown function of the file pages_system_settings.php. The manipulation of the argument sys_name with the input <ScRiPt >alert(991)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243132.

Action-Not Available
Vendor-martmbithiCodeAstro
Product-internet_banking_systemInternet Banking Systeminternet_banking_system
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 378
  • 379
  • Next
Details not found