Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-33322

Summary
Assigner-Mitsubishi
Assigner Org ID-e0f77b61-78fd-4786-b3fb-1ee347a748ad
Published At-08 Nov, 2022 | 00:00
Updated At-01 May, 2025 | 14:38
Rejected At-
Credits

Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Mitsubishi
Assigner Org ID:e0f77b61-78fd-4786-b3fb-1ee347a748ad
Published At:08 Nov, 2022 | 00:00
Updated At:01 May, 2025 | 14:38
Rejected At:
▼CVE Numbering Authority (CNA)

Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Affected Products
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FD40/56/63/71/8022S
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-HXV25/28/40/56/63/71/8022S
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-VXV40/56/63/71/8022S
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-ZD25/28/40/56/63/71/8022(S)
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FZ40/56/63/71/80/9021S
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9021(S)
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FZV40/56/63/71/80/9021S
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9021(S)
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9021E9(S)
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FZ40/56/63/71/80/9020S
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9020(S)
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FZV40/56/63/71/80/9020S
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9020(S)
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9020E8(S)
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface MAC-900IF
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface PAC-SK43ML
Default Status
unaffected
Versions
Affected
  • versions 30.00 to 35.00
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Refrigerator MR-MXD50/57G
Default Status
unaffected
Versions
Affected
  • versions 00.68 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Refrigerator MR-WXD52/60/70G
Default Status
unaffected
Versions
Affected
  • versions 00.68 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Refrigerator MR-WZ55/61H
Default Status
unaffected
Versions
Affected
  • versions 00.68 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Refrigerator MR-MZ54/60H
Default Status
unaffected
Versions
Affected
  • versions 00.68 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
HEMS adapter GT-HEM4
Default Status
unaffected
Versions
Affected
  • versions 00.83 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface GT-RA1
Default Status
unaffected
Versions
Affected
  • versions 00.83 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface GT-RA2
Default Status
unaffected
Versions
Affected
  • versions 00.83 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface GT-HR1
Default Status
unaffected
Versions
Affected
  • versions 00.83 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Remote control with Wi-Fi Interface RMCB-H6SE-T
Default Status
unaffected
Versions
Affected
  • versions 00.83 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Remote control with Wi-Fi Interface RMCB-F6SE-T
Default Status
unaffected
Versions
Affected
  • versions 00.83 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Remote control with Wi-Fi Interface RMCB-D6SE-T
Default Status
unaffected
Versions
Affected
  • versions 00.83 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
BATHROOM THERMO VENTILATOR V-241BZ-RC
Default Status
unaffected
Versions
Affected
  • versions 00.65 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
BATHROOM THERMO VENTILATOR V-241BZ5-RC
Default Status
unaffected
Versions
Affected
  • versions 00.65 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
BATHROOM THERMO VENTILATOR WD-240DK-RC
Default Status
unaffected
Versions
Affected
  • versions 00.65 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
BATHROOM THERMO VENTILATOR WD-240DK2-RC
Default Status
unaffected
Versions
Affected
  • versions 00.65 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Rice cooker NJ-AWBX10
Default Status
unaffected
Versions
Affected
  • versions 00.75 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Mitsubishi Electric HEMS control adapter P-HM04WA
Default Status
unaffected
Versions
Affected
  • versions 00.67 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface P-WA01
Default Status
unaffected
Versions
Affected
  • versions 00.67 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Energy Recovery Ventilator VL-200ZMHSV3-RC
Default Status
unaffected
Versions
Affected
  • versions 00.71 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Smart Switch P-1600SWRC
Default Status
unaffected
Versions
Affected
  • versions 00.90 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Smart Switch P-04SWRC
Default Status
unaffected
Versions
Affected
  • versions 00.90 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Smart Switch P-10SWRC
Default Status
unaffected
Versions
Affected
  • versions 00.90 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface MAC-587IF-E
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface MAC-587IF2-E
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface MAC-507IF-E
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface MAC-588IF-E
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Wi-Fi Interface S-MAC-002IF
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSXY-FP05/07/10/13/18/20/24VGK-SG1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSY-GP10/13/15/18/20/24VFK-SG1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50VGK-E1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50/60/71VGK-E3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50VGK-E7
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50VGK-E8
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50VGK-EN1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50VGK-EN2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50VGK-EN3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50VGK-ER1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ER2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50/60/71VGK-ER3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50VGK-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ET2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP25/35/42/50/60/71VGK-ET3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AY25/35/42/50VGK-E1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AY25/35/42/50VGK-E6
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AY25/35/42/50VGK-ER1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AY25/35/42/50VGK-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AY25/35/42/50VGK-SC1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AY25/35/42/50VGKP-E6
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AY25/35/42/50VGKP-ER1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AY25/35/42/50VGKP-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AY25/35/42/50VGKP-SC1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-BT20/25/35/50VGK-E1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-BT20/25/35/50VGK-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-BT20/25/35/50VGK-E3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-BT20/25/35/50VGK-ER1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-BT20/25/35/50VGK-ER2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-BT20/25/35/50VGK-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-BT20/25/35/50VGK-ET2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-BT20/25/35/50VGK-ET3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKB-ER1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKS-ER1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKB-ER2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKS-ER2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FT25/35/50VGK-E1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FT25/35/50VGK-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FT25/35/50VGK-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FT25/35/50VGK-SC1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-FT25/35/50VGK-SC2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-HR25/35/42/50/60/71VFK-E1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-HR25/35/42/50VFK-E6
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ER1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2W-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2W-E3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50VG2W-EN2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2W-ER2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2W-ER3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2W-ET2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2W-ET3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2V-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2V-E3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50VG2V-EN2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2V-ER2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2V-ER3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2V-ET2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2V-ET3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2B-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2B-E3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50VG2B-EN2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2B-ER2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2B-ER3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2B-ET2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2B-ET3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2R-E2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50/60VG2R-E3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50VG2R-EN2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2R-ER2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2R-ER3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2R-ET2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2R-ET3
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN18/25/35/50VG2W-SC1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50VG2V-SC1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50VG2B-SC1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50VG2R-SC1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-RW25/35/50VG-E1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-RW25/35/50VG-ER1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-RW25/35/50VG-ET1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-RW25/35/50VG-SC1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP22/25/35/42/50/61/70/80VGKD-A1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-AP22/25/35/42/50/60/71/80VGKD-A2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKW-A1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKB-A1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EF22/25/35/42/50VGKS-A1
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2V-A2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2B-A2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-LN25/35/50/60VG2R-A2
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MFZ-GXT50/60/73VFK
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MFZ-XT50/60VFK
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EZA09/12VAK
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-EXA09/12VAK
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-GZY09/12/18VFK
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-KY09/12/18VFK
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-WX18/20/25VFK
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Conditioning MSZ-ZY09/12/18VFK
Default Status
unaffected
Versions
Affected
  • Versions 35.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Purifier MA-EW85S-E
Default Status
unaffected
Versions
Affected
  • Versions 80.00 and prior
Vendor
Mitsubishi Electric CorporationMitsubishi Electric Corporation
Product
Air Purifier MA-EW85S-UK
Default Status
unaffected
Versions
Affected
  • Versions 80.00 and prior
Problem Types
TypeCWE IDDescription
CWECWE-79CWE-79 Cross-site Scripting (XSS)
Type: CWE
CWE ID: CWE-79
Description: CWE-79 Cross-site Scripting (XSS)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://jvn.jp/vu/JVNVU96767562/index.html
government-resource
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-011_en.pdf
vendor-advisory
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf
vendor-advisory
Hyperlink: https://jvn.jp/vu/JVNVU96767562/index.html
Resource:
government-resource
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-011_en.pdf
Resource:
vendor-advisory
Hyperlink: https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://jvn.jp/vu/JVNVU96767562/index.html
government-resource
x_transferred
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-011_en.pdf
vendor-advisory
x_transferred
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf
vendor-advisory
x_transferred
Hyperlink: https://jvn.jp/vu/JVNVU96767562/index.html
Resource:
government-resource
x_transferred
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-011_en.pdf
Resource:
vendor-advisory
x_transferred
Hyperlink: https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf
Resource:
vendor-advisory
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Published At:08 Nov, 2022 | 20:15
Updated At:01 May, 2025 | 15:15

Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Secondary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE Matches

Mitsubishi Electric Corporation
mitsubishielectric
>>mac-587if-e_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:mac-587if-e_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mac-587if-e>>-
cpe:2.3:h:mitsubishielectric:mac-587if-e:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mac-587if2-e_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:mac-587if2-e_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mac-587if2-e>>-
cpe:2.3:h:mitsubishielectric:mac-587if2-e:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mac-507if-e_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:mac-507if-e_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mac-507if-e>>-
cpe:2.3:h:mitsubishielectric:mac-507if-e:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mac-588if-e_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:mac-588if-e_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mac-588if-e>>-
cpe:2.3:h:mitsubishielectric:mac-588if-e:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>s-mac-002if_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:s-mac-002if_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>s-mac-002if>>-
cpe:2.3:h:mitsubishielectric:s-mac-002if:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>ma-ew85s-e_firmware>>Versions up to 80.00(inclusive)
cpe:2.3:o:mitsubishielectric:ma-ew85s-e_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>ma-ew85s-e>>-
cpe:2.3:h:mitsubishielectric:ma-ew85s-e:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>ma-ew85s-uk_firmware>>Versions up to 80.00(inclusive)
cpe:2.3:o:mitsubishielectric:ma-ew85s-uk_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>ma-ew85s-uk>>-
cpe:2.3:h:mitsubishielectric:ma-ew85s-uk:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mfz-gxt50\/60\/73vfk_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:mfz-gxt50\/60\/73vfk_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mfz-gxt50\/60\/73vfk>>-
cpe:2.3:h:mitsubishielectric:mfz-gxt50\/60\/73vfk:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mfz-xt50\/60vfk_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:mfz-xt50\/60vfk_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>mfz-xt50\/60vfk>>-
cpe:2.3:h:mitsubishielectric:mfz-xt50\/60vfk:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1>>-
cpe:2.3:h:mitsubishielectric:msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msy-gp10\/13\/15\/18\/20\/24vfk-sg1_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msy-gp10\/13\/15\/18\/20\/24vfk-sg1_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msy-gp10\/13\/15\/18\/20\/24vfk-sg1>>-
cpe:2.3:h:mitsubishielectric:msy-gp10\/13\/15\/18\/20\/24vfk-sg1:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2>>-
cpe:2.3:h:mitsubishielectric:msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2>>-
cpe:2.3:h:mitsubishielectric:msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2>>-
cpe:2.3:h:mitsubishielectric:msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2>>-
cpe:2.3:h:mitsubishielectric:msz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1>>-
cpe:2.3:h:mitsubishielectric:msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50\/60\/71vgk-e3_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap25\/35\/42\/50\/60\/71vgk-e3_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50\/60\/71vgk-e3>>-
cpe:2.3:h:mitsubishielectric:msz-ap25\/35\/42\/50\/60\/71vgk-e3:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50\/60\/71vgk-er3_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap25\/35\/42\/50\/60\/71vgk-er3_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50\/60\/71vgk-er3>>-
cpe:2.3:h:mitsubishielectric:msz-ap25\/35\/42\/50\/60\/71vgk-er3:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50\/60\/71vgk-et3_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap25\/35\/42\/50\/60\/71vgk-et3_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50\/60\/71vgk-et3>>-
cpe:2.3:h:mitsubishielectric:msz-ap25\/35\/42\/50\/60\/71vgk-et3:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-e1_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap25\/35\/42\/50vgk-e1_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-e1>>-
cpe:2.3:h:mitsubishielectric:msz-ap25\/35\/42\/50vgk-e1:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-e7_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap25\/35\/42\/50vgk-e7_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-e7>>-
cpe:2.3:h:mitsubishielectric:msz-ap25\/35\/42\/50vgk-e7:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-e8_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap25\/35\/42\/50vgk-e8_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-e8>>-
cpe:2.3:h:mitsubishielectric:msz-ap25\/35\/42\/50vgk-e8:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-en1_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap25\/35\/42\/50vgk-en1_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-en1>>-
cpe:2.3:h:mitsubishielectric:msz-ap25\/35\/42\/50vgk-en1:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-en2_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap25\/35\/42\/50vgk-en2_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-en2>>-
cpe:2.3:h:mitsubishielectric:msz-ap25\/35\/42\/50vgk-en2:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-en3_firmware>>Versions up to 35.00(inclusive)
cpe:2.3:o:mitsubishielectric:msz-ap25\/35\/42\/50vgk-en3_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>msz-ap25\/35\/42\/50vgk-en3>>-
cpe:2.3:h:mitsubishielectric:msz-ap25\/35\/42\/50vgk-en3:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79SecondaryMitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
CWE-79Primarynvd@nist.gov
CWE ID: CWE-79
Type: Secondary
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://jvn.jp/vu/JVNVU96767562/index.htmlMitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Third Party Advisory
VDB Entry
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdfMitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Mitigation
Vendor Advisory
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-011_en.pdfMitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Mitigation
Vendor Advisory
https://jvn.jp/vu/JVNVU96767562/index.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdfaf854a3a-2127-422b-91ae-364da2661108
Mitigation
Vendor Advisory
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-011_en.pdfaf854a3a-2127-422b-91ae-364da2661108
Mitigation
Vendor Advisory
Hyperlink: https://jvn.jp/vu/JVNVU96767562/index.html
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Resource:
Mitigation
Vendor Advisory
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-011_en.pdf
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Resource:
Mitigation
Vendor Advisory
Hyperlink: https://jvn.jp/vu/JVNVU96767562/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mitigation
Vendor Advisory
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-011_en.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mitigation
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

8992Records found

CVE-2024-42906
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.1||MEDIUM
EPSS-0.09% / 26.80%
||
7 Day CHG~0.00%
Published-26 Aug, 2024 | 00:00
Updated-05 Sep, 2024 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TestLink before v.1.9.20 is vulnerable to Cross Site Scripting (XSS) via the pop-up on upload file. When uploading a file, the XSS payload can be entered into the file name.

Action-Not Available
Vendor-testlinkn/aJenkins
Product-testlinkn/atestlink
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-41745
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.45% / 62.79%
||
7 Day CHG+0.07%
Published-01 Nov, 2024 | 16:48
Updated-14 Nov, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM CICS TX Standard cross-site scripting

IBM CICS TX Standard is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

Action-Not Available
Vendor-IBM Corporation
Product-cics_txCICS TX Standard
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-10875
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.21% / 43.16%
||
7 Day CHG~0.00%
Published-12 Aug, 2019 | 14:54
Updated-06 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The wp-database-backup plugin before 4.3.1 for WordPress has XSS.

Action-Not Available
Vendor-wpseedsn/a
Product-wp_database_backupn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-11400
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.38% / 58.45%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 21:31
Updated-20 Nov, 2024 | 14:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HUSKY – Products Filter for WooCommerce <= 1.3.6.3 - Reflected Cross-Site Scripting via really_curr_tax Parameter

The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the really_curr_tax parameter in all versions up to, and including, 1.3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-PluginUs.Net (RealMag777)
Product-HUSKY – Products Filter Professional for WooCommerce
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-8160
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-6.1||MEDIUM
EPSS-0.26% / 49.46%
||
7 Day CHG~0.00%
Published-06 Jan, 2021 | 14:03
Updated-04 Aug, 2024 | 09:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MendixSSO <= 2.1.1 contains endpoints that make use of the openid handler, which is suffering from a Cross-Site Scripting vulnerability via the URL path. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.

Action-Not Available
Vendor-mendixn/a
Product-mendixssoMendixSSO
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-10985
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 46.76%
||
7 Day CHG~0.00%
Published-17 Sep, 2019 | 14:24
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The echosign plugin before 1.2 for WordPress has XSS via the templates/add_templates.php id parameter.

Action-Not Available
Vendor-smackcodersn/a
Product-echo_signn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-22540
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-6.1||MEDIUM
EPSS-0.36% / 57.12%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 14:15
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in Dart SDK

Bad validation logic in the Dart SDK versions prior to 2.12.3 allow an attacker to use an XSS attack via DOM clobbering. The validation logic in dart:html for creating DOM nodes from text did not sanitize properly when it came across template tags.

Action-Not Available
Vendor-dartGoogle LLC
Product-dart_software_development_kitDart SDK
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-2220
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.07% / 21.45%
||
7 Day CHG~0.00%
Published-21 Apr, 2023 | 11:31
Updated-02 Aug, 2024 | 06:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dream Technology mica Form Object cross site scripting

A vulnerability was found in Dream Technology mica up to 3.0.5. It has been classified as problematic. Affected is an unknown function of the component Form Object Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-226986 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-dreamluDream Technology
Product-micamica
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-15874
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 52.75%
||
7 Day CHG~0.00%
Published-25 Aug, 2018 | 19:00
Updated-05 Aug, 2024 | 10:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows an attacker to inject JavaScript into the "Status -> Active Client Table" page via the hostname field in a DHCP request.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-615_firmwaredir-615n/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-15574
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.09%
||
7 Day CHG~0.00%
Published-20 Aug, 2018 | 02:00
Updated-30 Apr, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the license editor in Reprise License Manager (RLM) through 12.2BL2. It is a cross-site scripting vulnerability in the /goform/edit_lf_get_data lf parameter via GET or POST. NOTE: the vendor has stated "We do not consider this a vulnerability."

Action-Not Available
Vendor-reprisesoftwaren/a
Product-reprise_license_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-41746
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 20.30%
||
7 Day CHG+0.02%
Published-16 Jan, 2025 | 17:13
Updated-14 Aug, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM CICS TX cross-site scripting

IBM CICS TX Advanced 10.1, 11.1, and Standard 11.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

Action-Not Available
Vendor-Linux Kernel Organization, IncIBM Corporation
Product-linux_kernelcics_txCICS TX AdvancedCICS TX Standard
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-15740
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.04% / 76.55%
||
7 Day CHG~0.00%
Published-28 Aug, 2018 | 19:00
Updated-05 Aug, 2024 | 10:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoho ManageEngine ADManager Plus 6.5.7 has XSS on the "Workflow Delegation" "Requester Roles" screen.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_admanager_plusn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-22813
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-6.1||MEDIUM
EPSS-0.81% / 73.34%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 19:09
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause arbritrary script execution when a privileged account clicks on a malicious URL specifically crafted for the NMC pointing to an edit policy file. Affected Products: 1-Phase Uninterruptible Power Supply (UPS) using NMC2 including Smart-UPS, Symmetra, and Galaxy 3500 with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635J (NMC2 AOS V6.9.8 and earlier), 3-Phase Uninterruptible Power Supply (UPS) using NMC2 including Symmetra PX 250/500 (SYPX) Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635J (NMC2 AOS V6.9.6 and earlier), 3-Phase Uninterruptible Power Supply (UPS) using NMC2 including Symmetra PX 48/96/100/160 kW UPS (PX2), Symmetra PX 20/40 kW UPS (SY3P), Gutor (SXW, GVX), and Galaxy (GVMTS, GVMSA, GVXTS, GVXSA, G7K, GFC, G9KCHU): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635CH (NMC2 AOS V6.9.6 and earlier), 1-Phase Uninterruptible Power Supply (UPS) using NMC3 including Smart-UPS, Symmetra, and Galaxy 3500 with Network Management Card 3 (NMC3): AP9640/AP9640J, AP9641/AP9641J, AP9643/AP9643J (NMC3 AOS V1.4.2.1 and earlier), APC Rack Power Distribution Units (PDU) using NMC2 2G Metered/Switched Rack PDUs with embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX (NMC2 AOS V6.9.6 and earlier), APC Rack Power Distribution Units (PDU) using NMC3 2G Metered/Switched Rack PDUs with embedded NMC3: APDU99xx (NMC3 AOS V1.4.0 and earlier), APC 3-Phase Power Distribution Products using NMC2 Galaxy RPP: GRPPIP2X84 (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 (NMC2) for InfraStruxure 150 kVA PDU with 84 Poles (X84P): PDPB150G6F (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for InfraStruxure 40/60kVA PDU (XPDU) PD40G6FK1-M, PD40F6FK1-M, PD40L6FK1-M, PDRPPNX10 M,PD60G6FK1, PD60F6FK1, PD60L6FK1, PDRPPNX10, PD40E5EK20-M, PD40H5EK20-M (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for Modular 150/175kVA PDU (XRDP): PDPM150G6F, PDPM150L6F, PDPM175G6H (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for 400 and 500 kVA (PMM): PMM400-ALA, PMM400-ALAX, PMM400-CUB, PMM500-ALA, PMM500-ALAX, PMM500-CUB (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for Modular PDU (XRDP2G): PDPM72F-5U, PDPM138H-5U, PDPM144F, PDPM138H-R, PDPM277H, PDPM288G6H (NMC2 AOS V6.9.6 and earlier), Rack Automatic Transfer Switches (ATS) Embedded NMC2: Rack Automatic Transfer Switches - AP44XX (ATS4G) (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 (NMC2) Cooling Products: InRow Cooling for series ACRP5xx, ACRP1xx, ACRD5xx, and ACRC5xx SKUs (ACRP2G), InRow Cooling for series ACRC10x SKUs (RC10X2G), InRow Cooling for series ACRD6xx and ACRC6xx SKUs (ACRD2G), InRow Cooling Display for series ACRD3xx (ACRC2G), InRow Cooling for series ACSC1xx SKUs (SC2G), InRow Cooling for series ACRD1xx and ACRD2xx (ACRPTK2G), Ecoflair IAEC25/50 Air Economizer Display (EB2G), Uniflair SP UCF0481I, UCF0341I (UNFLRSP), Uniflair LE DX Perimeter Cooling Display for SKUs: IDAV, IDEV, IDWV, IUAV, IUEV, IUWV, IXAV, IXEV, IXWV, LDAV, LDEV, and LDWV (LEDX2G), Refrigerant Distribution Unit: ACDA9xx (RDU) (NMC2 AOS V6.9.6 and earlier), Environmental Monitoring Unit with embedded NMC2 (NB250): NetBotz NBRK0250 (NMC2 AOS V6.9.6 and earlier), and Network Management Card 2 (NMC2): AP9922 Battery Management System (BM4) (NMC2 AOS V6.9.6 and earlier)

Action-Not Available
Vendor-n/a
Product-single-phase_symmetragalaxy_g9kchupdpm138h-5upd60f6fk1pdpm277hpd40e5ek20-mpd40l6fk1-msymmetra_px_20galaxy_gvmsapd60g6fk1gutor_gvxgalaxy_3500network_management_card_2_firmwarepdpm150g6fpdrppnx10pdpb150g6fpmm500-alaxgutor_sxwpdpm150l6fpdpm175g6hapc_rack_power_distribution_unitspd60l6fk1pdpm288g6hnetwork_management_card_3pdpm138h-rpdrppnx10mpd40f6fk1-mrack_automatic_transfer_switchessmart-upspd40h5ek20-mnetwork_management_card_2symmetra_px_160pmm400-alaxsymmetra_px_40symmetra_px_48netbotz_nbrk0250pmm400-alagalaxy_g7xnetwork_management_card_3_firmwarepdpm144fpmm400-cubgalaxy_gfcgalaxy_rpp_grppip2x84ap9922_battery_management_systemsymmetra_px_100symmetra_px_500galaxy_gcxsagalaxy_gvxtssymmetra_px_250symmetra_px_96pmm500-cubpd40g6fk1-mgalaxy_gvmtspmm500-alapdpm72f-5un/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-8033
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.15%
||
7 Day CHG~0.00%
Published-05 May, 2020 | 17:08
Updated-04 Aug, 2024 | 09:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ruckus R500 3.4.2.0.384 devices allow XSS via the index.asp Device Name field.

Action-Not Available
Vendor-commscopen/a
Product-ruckus_zoneflex_r500ruckus_zoneflex_r500_firmwaren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-15583
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 53.14%
||
7 Day CHG~0.00%
Published-25 Mar, 2019 | 20:19
Updated-19 Sep, 2024 | 11:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-Site Scripting (XSS) vulnerability in point_list.php in GNUBOARD5 before 5.3.1.6 allows remote attackers to inject arbitrary web script or HTML via the popup title parameter.

Action-Not Available
Vendor-sirn/a
Product-gnuboardn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22300
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.1||MEDIUM
EPSS-0.15% / 36.67%
||
7 Day CHG~0.00%
Published-27 Mar, 2023 | 19:36
Updated-17 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-22300

An unauthenticated remote attacker could force all authenticated users, such as administrative users, to perform unauthorized actions by viewing the logs. This action would also grant the attacker privilege escalation.

Action-Not Available
Vendor-sauter-controlsSAUTER
Product-ey-as525f001_firmwareey-as525f001EY-AS525F001 with moduWeb
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-16455
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.15%
||
7 Day CHG~0.00%
Published-04 Oct, 2018 | 21:00
Updated-05 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP Scripts Mall Market Place Script 1.0.1 allows XSS via a keyword.

Action-Not Available
Vendor-marketplace_script_projectn/a
Product-marketplace_scriptn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-22811
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-6.1||MEDIUM
EPSS-0.81% / 73.34%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 19:09
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause script execution when the request of a privileged account accessing the vulnerable web page is intercepted. Affected Products: 1-Phase Uninterruptible Power Supply (UPS) using NMC2 including Smart-UPS, Symmetra, and Galaxy 3500 with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635J (NMC2 AOS V6.9.8 and earlier), 3-Phase Uninterruptible Power Supply (UPS) using NMC2 including Symmetra PX 250/500 (SYPX) Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635J (NMC2 AOS V6.9.6 and earlier), 3-Phase Uninterruptible Power Supply (UPS) using NMC2 including Symmetra PX 48/96/100/160 kW UPS (PX2), Symmetra PX 20/40 kW UPS (SY3P), Gutor (SXW, GVX), and Galaxy (GVMTS, GVMSA, GVXTS, GVXSA, G7K, GFC, G9KCHU): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635CH (NMC2 AOS V6.9.6 and earlier), 1-Phase Uninterruptible Power Supply (UPS) using NMC3 including Smart-UPS, Symmetra, and Galaxy 3500 with Network Management Card 3 (NMC3): AP9640/AP9640J, AP9641/AP9641J, AP9643/AP9643J (NMC3 AOS V1.4.2.1 and earlier), APC Rack Power Distribution Units (PDU) using NMC2 2G Metered/Switched Rack PDUs with embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX (NMC2 AOS V6.9.6 and earlier), APC Rack Power Distribution Units (PDU) using NMC3 2G Metered/Switched Rack PDUs with embedded NMC3: APDU99xx (NMC3 AOS V1.4.0 and earlier), APC 3-Phase Power Distribution Products using NMC2 Galaxy RPP: GRPPIP2X84 (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 (NMC2) for InfraStruxure 150 kVA PDU with 84 Poles (X84P): PDPB150G6F (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for InfraStruxure 40/60kVA PDU (XPDU) PD40G6FK1-M, PD40F6FK1-M, PD40L6FK1-M, PDRPPNX10 M,PD60G6FK1, PD60F6FK1, PD60L6FK1, PDRPPNX10, PD40E5EK20-M, PD40H5EK20-M (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for Modular 150/175kVA PDU (XRDP): PDPM150G6F, PDPM150L6F, PDPM175G6H (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for 400 and 500 kVA (PMM): PMM400-ALA, PMM400-ALAX, PMM400-CUB, PMM500-ALA, PMM500-ALAX, PMM500-CUB (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for Modular PDU (XRDP2G): PDPM72F-5U, PDPM138H-5U, PDPM144F, PDPM138H-R, PDPM277H, PDPM288G6H (NMC2 AOS V6.9.6 and earlier), Rack Automatic Transfer Switches (ATS) Embedded NMC2: Rack Automatic Transfer Switches - AP44XX (ATS4G) (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 (NMC2) Cooling Products: InRow Cooling for series ACRP5xx, ACRP1xx, ACRD5xx, and ACRC5xx SKUs (ACRP2G), InRow Cooling for series ACRC10x SKUs (RC10X2G), InRow Cooling for series ACRD6xx and ACRC6xx SKUs (ACRD2G), InRow Cooling Display for series ACRD3xx (ACRC2G), InRow Cooling for series ACSC1xx SKUs (SC2G), InRow Cooling for series ACRD1xx and ACRD2xx (ACRPTK2G), Ecoflair IAEC25/50 Air Economizer Display (EB2G), Uniflair SP UCF0481I, UCF0341I (UNFLRSP), Uniflair LE DX Perimeter Cooling Display for SKUs: IDAV, IDEV, IDWV, IUAV, IUEV, IUWV, IXAV, IXEV, IXWV, LDAV, LDEV, and LDWV (LEDX2G), Refrigerant Distribution Unit: ACDA9xx (RDU) (NMC2 AOS V6.9.6 and earlier), Environmental Monitoring Unit with embedded NMC2 (NB250): NetBotz NBRK0250 (NMC2 AOS V6.9.6 and earlier), and Network Management Card 2 (NMC2): AP9922 Battery Management System (BM4) (NMC2 AOS V6.9.6 and earlier)

Action-Not Available
Vendor-n/a
Product-single-phase_symmetragalaxy_g9kchupdpm138h-5upd60f6fk1pdpm277hpd40e5ek20-mpd40l6fk1-msymmetra_px_20galaxy_gvmsapd60g6fk1gutor_gvxgalaxy_3500network_management_card_2_firmwarepdpm150g6fpdrppnx10pdpb150g6fpmm500-alaxgutor_sxwpdpm150l6fpdpm175g6hapc_rack_power_distribution_unitspd60l6fk1pdpm288g6hnetwork_management_card_3pdpm138h-rpdrppnx10mpd40f6fk1-mrack_automatic_transfer_switchessmart-upspd40h5ek20-mnetwork_management_card_2symmetra_px_160pmm400-alaxsymmetra_px_40symmetra_px_48netbotz_nbrk0250pmm400-alagalaxy_g7xnetwork_management_card_3_firmwarepdpm144fpmm400-cubgalaxy_gfcgalaxy_rpp_grppip2x84ap9922_battery_management_systemsymmetra_px_100symmetra_px_500galaxy_gcxsagalaxy_gvxtssymmetra_px_250symmetra_px_96pmm500-cubpd40g6fk1-mgalaxy_gvmtspmm500-alapdpm72f-5un/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-2272
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-10.26% / 92.86%
||
7 Day CHG~0.00%
Published-16 Aug, 2023 | 11:03
Updated-08 Oct, 2024 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tiempo.com <= 0.1.2 - Reflected XSS

The Tiempo.com WordPress plugin through 0.1.2 does not sanitise and escape the page parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Action-Not Available
Vendor-tiempoUnknown
Product-tiempoTiempo.com
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-15027
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.17% / 38.02%
||
7 Day CHG~0.00%
Published-20 Feb, 2023 | 17:00
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
meta4creations Post Duplicator Plugin notices.php mtphr_post_duplicator_notice cross site scripting

A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496.

Action-Not Available
Vendor-metaphorcreationsmeta4creations
Product-post_duplicatorPost Duplicator Plugin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-16362
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.44% / 62.40%
||
7 Day CHG~0.00%
Published-02 Sep, 2018 | 22:00
Updated-05 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Source Integration plugin before 1.5.9 and 2.x before 2.1.5 for MantisBT. A cross-site scripting (XSS) vulnerability in the Manage Repository and Changesets List pages allows execution of arbitrary code (if CSP settings permit it) via repo_manage_page.php or list.php.

Action-Not Available
Vendor-n/aMantis Bug Tracker (MantisBT)
Product-source_integrationn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2015-10049
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.07% / 21.79%
||
7 Day CHG~0.00%
Published-15 Jan, 2023 | 17:58
Updated-06 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Overdrive Eletrônica course-builder oeditor.html cross site scripting

A vulnerability was found in Overdrive Eletrônica course-builder up to 1.7.x and classified as problematic. Affected by this issue is some unknown functionality of the file coursebuilder/modules/oeditor/oeditor.html. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.0 is able to address this issue. The name of the patch is e39645fd714adb7e549908780235911ae282b21b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218372.

Action-Not Available
Vendor-course-builder_projectOverdrive Eletrônica
Product-course-buildercourse-builder
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-15875
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 52.75%
||
7 Day CHG~0.00%
Published-25 Aug, 2018 | 19:00
Updated-05 Aug, 2024 | 10:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows attackers to inject JavaScript into the router's admin UPnP page via the description field in an AddPortMapping UPnP SOAP request.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-615_firmwaredir-615n/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22582
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-9||CRITICAL
EPSS-0.10% / 29.21%
||
7 Day CHG~0.00%
Published-11 Jun, 2023 | 13:17
Updated-09 Jan, 2025 | 07:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-Site Scripting in Danfoss AK-EM100

The Danfoss AK-EM100 web applications allow for Reflected Cross-Site Scripting.

Action-Not Available
Vendor-danfossDanfoss
Product-ak-em100_firmwareak-em100AK-EM100
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-10872
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.31% / 53.63%
||
7 Day CHG~0.00%
Published-12 Aug, 2019 | 15:24
Updated-06 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ultimate-member plugin before 1.3.40 for WordPress has XSS on the login form.

Action-Not Available
Vendor-n/aUltimate Member Group Ltd
Product-ultimate_membern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-15406
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.36% / 57.41%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 14:00
Updated-26 Nov, 2024 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco UCS Director Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ucs_directorCisco Unified Computing System Director
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-42412
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.19% / 41.39%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 06:29
Updated-26 Nov, 2024 | 08:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in ELECOM wireless access points due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-wab-i1750-ps_firmwarewab-s1167-pswab-s1167-ps_firmwarewab-i1750-psWAB-M1775-PSWAB-S1775WAB-I1750-PSWAB-S733MIWAB-S1167-PS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-42818
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 25.42%
||
7 Day CHG~0.00%
Published-26 Aug, 2024 | 00:00
Updated-26 Aug, 2024 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) vulnerability in the Config-Create function of fastapi-admin pro v0.1.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Product Name parameter.

Action-Not Available
Vendor-n/afastapi-admin
Product-n/afastapi-admin_pro
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-22814
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-6.1||MEDIUM
EPSS-0.81% / 73.34%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 19:09
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists which could cause arbritrary script execution when a malicious file is read and displayed. Affected Products: 1-Phase Uninterruptible Power Supply (UPS) using NMC2 including Smart-UPS, Symmetra, and Galaxy 3500 with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635J (NMC2 AOS V6.9.8 and earlier), 3-Phase Uninterruptible Power Supply (UPS) using NMC2 including Symmetra PX 250/500 (SYPX) Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635J (NMC2 AOS V6.9.6 and earlier), 3-Phase Uninterruptible Power Supply (UPS) using NMC2 including Symmetra PX 48/96/100/160 kW UPS (PX2), Symmetra PX 20/40 kW UPS (SY3P), Gutor (SXW, GVX), and Galaxy (GVMTS, GVMSA, GVXTS, GVXSA, G7K, GFC, G9KCHU): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635CH (NMC2 AOS V6.9.6 and earlier), 1-Phase Uninterruptible Power Supply (UPS) using NMC3 including Smart-UPS, Symmetra, and Galaxy 3500 with Network Management Card 3 (NMC3): AP9640/AP9640J, AP9641/AP9641J, AP9643/AP9643J (NMC3 AOS V1.4.2.1 and earlier), APC Rack Power Distribution Units (PDU) using NMC2 2G Metered/Switched Rack PDUs with embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX (NMC2 AOS V6.9.6 and earlier), APC Rack Power Distribution Units (PDU) using NMC3 2G Metered/Switched Rack PDUs with embedded NMC3: APDU99xx (NMC3 AOS V1.4.0 and earlier), APC 3-Phase Power Distribution Products using NMC2 Galaxy RPP: GRPPIP2X84 (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 (NMC2) for InfraStruxure 150 kVA PDU with 84 Poles (X84P): PDPB150G6F (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for InfraStruxure 40/60kVA PDU (XPDU) PD40G6FK1-M, PD40F6FK1-M, PD40L6FK1-M, PDRPPNX10 M,PD60G6FK1, PD60F6FK1, PD60L6FK1, PDRPPNX10, PD40E5EK20-M, PD40H5EK20-M (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for Modular 150/175kVA PDU (XRDP): PDPM150G6F, PDPM150L6F, PDPM175G6H (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for 400 and 500 kVA (PMM): PMM400-ALA, PMM400-ALAX, PMM400-CUB, PMM500-ALA, PMM500-ALAX, PMM500-CUB (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for Modular PDU (XRDP2G): PDPM72F-5U, PDPM138H-5U, PDPM144F, PDPM138H-R, PDPM277H, PDPM288G6H (NMC2 AOS V6.9.6 and earlier), Rack Automatic Transfer Switches (ATS) Embedded NMC2: Rack Automatic Transfer Switches - AP44XX (ATS4G) (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 (NMC2) Cooling Products: InRow Cooling for series ACRP5xx, ACRP1xx, ACRD5xx, and ACRC5xx SKUs (ACRP2G), InRow Cooling for series ACRC10x SKUs (RC10X2G), InRow Cooling for series ACRD6xx and ACRC6xx SKUs (ACRD2G), InRow Cooling Display for series ACRD3xx (ACRC2G), InRow Cooling for series ACSC1xx SKUs (SC2G), InRow Cooling for series ACRD1xx and ACRD2xx (ACRPTK2G), Ecoflair IAEC25/50 Air Economizer Display (EB2G), Uniflair SP UCF0481I, UCF0341I (UNFLRSP), Uniflair LE DX Perimeter Cooling Display for SKUs: IDAV, IDEV, IDWV, IUAV, IUEV, IUWV, IXAV, IXEV, IXWV, LDAV, LDEV, and LDWV (LEDX2G), Refrigerant Distribution Unit: ACDA9xx (RDU) (NMC2 AOS V6.9.6 and earlier), Environmental Monitoring Unit with embedded NMC2 (NB250): NetBotz NBRK0250 (NMC2 AOS V6.9.6 and earlier), and Network Management Card 2 (NMC2): AP9922 Battery Management System (BM4) (NMC2 AOS V6.9.6 and earlier)

Action-Not Available
Vendor-n/a
Product-single-phase_symmetragalaxy_g9kchupdpm138h-5upd60f6fk1pdpm277hpd40e5ek20-mpd40l6fk1-msymmetra_px_20galaxy_gvmsapd60g6fk1gutor_gvxgalaxy_3500network_management_card_2_firmwarepdpm150g6fpdrppnx10pdpb150g6fpmm500-alaxgutor_sxwpdpm150l6fpdpm175g6hapc_rack_power_distribution_unitspd60l6fk1pdpm288g6hnetwork_management_card_3pdpm138h-rpdrppnx10mpd40f6fk1-mrack_automatic_transfer_switchessmart-upspd40h5ek20-mnetwork_management_card_2symmetra_px_160pmm400-alaxsymmetra_px_40symmetra_px_48netbotz_nbrk0250pmm400-alagalaxy_g7xnetwork_management_card_3_firmwarepdpm144fpmm400-cubgalaxy_gfcgalaxy_rpp_grppip2x84ap9922_battery_management_systemsymmetra_px_100symmetra_px_500galaxy_gcxsagalaxy_gvxtssymmetra_px_250symmetra_px_96pmm500-cubpd40g6fk1-mgalaxy_gvmtspmm500-alapdpm72f-5un/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-21746
Matching Score-4
Assigner-ZTE Corporation
ShareView Details
Matching Score-4
Assigner-ZTE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.53% / 66.08%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 14:34
Updated-03 Aug, 2024 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE MF971R product has reflective XSS vulnerability. An attacker could use the vulnerability to obtain cookie information.

Action-Not Available
Vendor-n/aZTE Corporation
Product-mf971rmf971r_firmwareMF971R
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22705
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-7.1||HIGH
EPSS-0.08% / 24.96%
||
7 Day CHG~0.00%
Published-29 Mar, 2023 | 19:32
Updated-20 Feb, 2025 | 18:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Welcart e-Commerce Plugin <= 2.8.10 is vulnerable to Cross Site Scripting (XSS)

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Collne Inc. Welcart e-Commerce plugin <= 2.8.10 versions.

Action-Not Available
Vendor-welcartCollne Inc.
Product-welcart_e-commerceWelcart e-Commerce
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-15820
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.23% / 46.13%
||
7 Day CHG~0.00%
Published-02 Mar, 2020 | 18:09
Updated-05 Aug, 2024 | 10:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EasyIO EasyIO-30P devices before 2.0.5.27 allow XSS via the dev.htm GDN parameter.

Action-Not Available
Vendor-easyion/a
Product-easyio_30p_firmwareeasyio_30pn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22333
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.46% / 63.35%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 00:00
Updated-28 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability in EasyMail 2.00.130 and earlier allows a remote unauthenticated attacker to inject an arbitrary script.

Action-Not Available
Vendor-mubagFirst Net Japan Inc.
Product-easymailEasyMail
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1160
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.44% / 62.38%
||
7 Day CHG~0.00%
Published-26 Mar, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the WP Favorite Posts plugin before 1.6.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-wp_favorite_posts_projectn/a
Product-wp_favorite_postsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-11809
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.14% / 35.08%
||
7 Day CHG~0.00%
Published-13 Dec, 2024 | 04:23
Updated-16 Dec, 2024 | 20:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Primer MyData for Woocommerce <= 4.2.1 - Reflected Cross-Site Scripting

The Primer MyData for Woocommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'img_src' parameter in all versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-primersoftware
Product-Primer MyData for Woocommerce
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-4272
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 48.50%
||
7 Day CHG~0.00%
Published-13 Jul, 2024 | 06:00
Updated-15 May, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Support SVG < 1.1.0 - Stored XSS via SVG Upload

The Support SVG WordPress plugin before 1.1.0 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks.

Action-Not Available
Vendor-sayedulsayemUnknownsupport_svg
Product-support_svgSupport SVG support_svg_wordpress
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22455
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 22.93%
||
7 Day CHG~0.00%
Published-05 Jan, 2023 | 20:02
Updated-10 Mar, 2025 | 21:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Discourse vulnerable to Cross-site Scripting through tag descriptions

Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, tag descriptions, which can be updated by moderators, can be used for cross-site scripting attacks. This vulnerability can lead to a full XSS on sites which have modified or disabled Discourse’s default Content Security Policy. Versions 2.8.14 and 3.0.0.beta16 contain a patch.

Action-Not Available
Vendor-Civilized Discourse Construction Kit, Inc.
Product-discoursediscourse
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-42378
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 25.42%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 02:41
Updated-10 Sep, 2024 | 13:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-Site Scripting (XSS) in eProcurement on S/4HANA

Due to weak encoding of user-controlled inputs, eProcurement on SAP S/4HANA allows malicious scripts to be executed in the application, potentially leading to a Reflected Cross-Site Scripting (XSS) vulnerability. This has no impact on the availability of the application, but it can have some minor impact on its confidentiality and integrity.

Action-Not Available
Vendor-SAP SE
Product-SAP S/4HANA eProcurement
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-14512
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 44.76%
||
7 Day CHG~0.00%
Published-23 Jul, 2018 | 08:00
Updated-05 May, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An XSS vulnerability was discovered in WUZHI CMS 4.1.0. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[nickname] parameter to the index.php?m=core&f=set&v=sendmail URI. When the administrator accesses the "system settings - mail server" screen, the XSS payload is triggered.

Action-Not Available
Vendor-wuzhicmsn/a
Product-wuzhicmsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-41910
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 33.12%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 14:05
Updated-14 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware contained multiple XSS vulnerabilities in the version of JavaScript used.

Action-Not Available
Vendor-HP Inc.
Product-poly_clariti_manager_firmwarepoly_clariti_managerPoly Clariti Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-7236
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.09%
||
7 Day CHG~0.00%
Published-19 Jan, 2020 | 20:02
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UHP UHP-100 3.4.1.15, 3.4.2.4, and 3.4.3 devices allow XSS via cw2?td= (Site Name field of the Site Setup section).

Action-Not Available
Vendor-uhpn/a
Product-uhp-100uhp-100_firmwaren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-42671
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 12.78%
||
7 Day CHG~0.00%
Published-31 Jan, 2025 | 00:00
Updated-19 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Host Header Poisoning Open Redirect issue in slabiak Appointment Scheduler v.1.0.5 allows a remote attacker to redirect users to a malicious website, leading to potential credential theft, malware distribution, or other malicious activities.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22035
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-6.1||MEDIUM
EPSS-0.36% / 57.55%
||
7 Day CHG~0.00%
Published-18 Jul, 2023 | 20:18
Updated-13 Sep, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Scripting product of Oracle E-Business Suite (component: iSurvey Module). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Scripting. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Scripting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Scripting accessible data as well as unauthorized read access to a subset of Oracle Scripting accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-e-business_suiteScripting
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-11993
Matching Score-4
Assigner-Liferay, Inc.
ShareView Details
Matching Score-4
Assigner-Liferay, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.06% / 18.84%
||
7 Day CHG~0.00%
Published-17 Dec, 2024 | 20:24
Updated-28 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Reflected cross-site scripting (XSS) vulnerability in Liferay Portal 7.4.0 through 7.4.3.38, and Liferay DXP 7.4 GA through update 38 allows remote attackers to execute arbitrary web script or HTML via Dispatch name field

Action-Not Available
Vendor-Liferay Inc.
Product-liferay_portaldigital_experience_platformDXPPortal
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-9916
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.19% / 41.66%
||
7 Day CHG~0.00%
Published-23 Feb, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Bilboplanet 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) tribe_name or (2) tags parameter in a tribes page request to user/ or the (3) user_id or (4) fullname parameter to signup.php.

Action-Not Available
Vendor-bilboplanetn/a
Product-bilboplanetn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22309
Matching Score-4
Assigner-Checkmk GmbH
ShareView Details
Matching Score-4
Assigner-Checkmk GmbH
CVSS Score-6.1||MEDIUM
EPSS-0.43% / 62.03%
||
7 Day CHG~0.00%
Published-20 Apr, 2023 | 13:05
Updated-04 Feb, 2025 | 21:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross Site Scripting (XSS)

Reflective Cross-Site-Scripting in Webconf in Tribe29 Checkmk Appliance before 1.6.4.

Action-Not Available
Vendor-tribe29 GmbH
Product-checkmk_appliance_firmwareCheckmk Appliance
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-42061
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.23% / 46.01%
||
7 Day CHG~0.00%
Published-03 Sep, 2024 | 01:59
Updated-13 Dec, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A reflected cross-site scripting (XSS) vulnerability in the CGI program "dynamic_script.cgi" of Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V4.16 through V5.38, and USG20(W)-VPN series firmware versions from V4.16 through V5.38 could allow an attacker to trick a user into visiting a crafted URL with the XSS payload. The attacker could obtain browser-based information if the malicious script is executed on the victim’s browser.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-zldusg_20w-vpnatp100atp800usg_flex_200usg_flex_100atp100wusg_flex_50watp200atp500atp700usg_flex_100axusg_flex_700usg_flex_100wusg_flex_500usg_flex_50USG FLEX 50(W) series firmwareUSG20(W)-VPN series firmwareUSG FLEX series firmwareATP series firmware
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22704
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-7.1||HIGH
EPSS-0.08% / 24.96%
||
7 Day CHG~0.00%
Published-23 Mar, 2023 | 11:40
Updated-02 Aug, 2024 | 10:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress teachPress Plugin <= 8.1.8 is vulnerable to Cross Site Scripting (XSS)

Reflected Cross-Site Scripting (XSS) vulnerability in Michael Winkler teachPress plugin <= 8.1.8 versions.

Action-Not Available
Vendor-mtrvMichael Winkler
Product-teachpressteachPress
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-14476
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.09%
||
7 Day CHG~0.00%
Published-31 Dec, 2019 | 15:18
Updated-05 Aug, 2024 | 09:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GeniXCMS 1.1.5 has XSS via the dbuser or dbhost parameter during step 1 of installation.

Action-Not Available
Vendor-metalgenixn/a
Product-genixcmsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-11943
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 59.88%
||
7 Day CHG+0.19%
Published-07 Dec, 2024 | 01:45
Updated-09 Dec, 2024 | 18:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
워드프레스 결제 심플페이 – 우커머스 결제 플러그인 <= 5.2.2 - Reflected Cross-Site Scripting via add_query_arg Parameter

The 워드프레스 결제 심플페이 – 우커머스 결제 플러그인 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.2.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-codemstory
Product-워드프레스 결제 심플페이 – 우커머스 결제 플러그인
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 179
  • 180
  • Next
Details not found