Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-70128

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-10 Mar, 2026 | 00:00
Updated At-12 Mar, 2026 | 18:41
Rejected At-
Credits

A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article comments feature for PluXml versions 5.8.22 and earlier. The application fails to properly sanitize or validate user-supplied input in the "link" field of a comment. An attacker can inject arbitrary JavaScript code using a <script> element. The injected payload is stored in the database and subsequently rendered in the Administration panel's "Comments" section when administrators review submitted comments. Importantly, the malicious script is not reflected in the public-facing comments interface, but only within the backend administration view. Alternatively, users of Administrator, Moderator, Manager roles can also directly input crafted payloads into existing comments. This makes the vulnerability a persistent XSS issue targeting administrative users. This affects /core/admin/comments.php, while CVE-2022-24585 affects /core/admin/comment.php, a uniquely distinct vulnerability.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:10 Mar, 2026 | 00:00
Updated At:12 Mar, 2026 | 18:41
Rejected At:
▼CVE Numbering Authority (CNA)

A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article comments feature for PluXml versions 5.8.22 and earlier. The application fails to properly sanitize or validate user-supplied input in the "link" field of a comment. An attacker can inject arbitrary JavaScript code using a <script> element. The injected payload is stored in the database and subsequently rendered in the Administration panel's "Comments" section when administrators review submitted comments. Importantly, the malicious script is not reflected in the public-facing comments interface, but only within the backend administration view. Alternatively, users of Administrator, Moderator, Manager roles can also directly input crafted payloads into existing comments. This makes the vulnerability a persistent XSS issue targeting administrative users. This affects /core/admin/comments.php, while CVE-2022-24585 affects /core/admin/comment.php, a uniquely distinct vulnerability.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://youtu.be/iOXWpiljV0w
N/A
https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70128.pdf
N/A
Hyperlink: https://youtu.be/iOXWpiljV0w
Resource: N/A
Hyperlink: https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70128.pdf
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-79CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: CWE-79
Description: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70128.pdf
exploit
Hyperlink: https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70128.pdf
Resource:
exploit
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:10 Mar, 2026 | 20:16
Updated At:07 Apr, 2026 | 01:21

A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article comments feature for PluXml versions 5.8.22 and earlier. The application fails to properly sanitize or validate user-supplied input in the "link" field of a comment. An attacker can inject arbitrary JavaScript code using a <script> element. The injected payload is stored in the database and subsequently rendered in the Administration panel's "Comments" section when administrators review submitted comments. Importantly, the malicious script is not reflected in the public-facing comments interface, but only within the backend administration view. Alternatively, users of Administrator, Moderator, Manager roles can also directly input crafted payloads into existing comments. This makes the vulnerability a persistent XSS issue targeting administrative users. This affects /core/admin/comments.php, while CVE-2022-24585 affects /core/admin/comment.php, a uniquely distinct vulnerability.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE Matches

pluxml
pluxml
>>pluxml>>Versions up to 5.8.22(inclusive)
cpe:2.3:a:pluxml:pluxml:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-79
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70128.pdfcve@mitre.org
Exploit
Third Party Advisory
https://youtu.be/iOXWpiljV0wcve@mitre.org
Exploit
https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70128.pdf134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Third Party Advisory
Hyperlink: https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70128.pdf
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://youtu.be/iOXWpiljV0w
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70128.pdf
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

10369Records found

CVE-2026-25136
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.1||HIGH
EPSS-0.08% / 23.42%
||
7 Day CHG+0.01%
Published-25 Feb, 2026 | 18:57
Updated-27 Feb, 2026 | 15:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rucio WebUI has a Reflected Cross-site Scripting Vulnerability

Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. A reflected Cross-site Scripting vulnerability was located in versions prior to 35.8.3, 38.5.4, and 39.3.1 in the rendering of the ExceptionMessage of the WebUI 500 error which could allow attackers to steal login session tokens of users who navigate to a specially crafted URL. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue.

Action-Not Available
Vendor-cernrucio
Product-ruciorucio
CWE ID-CWE-1004
Sensitive Cookie Without 'HttpOnly' Flag
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34328
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-5.98% / 90.73%
||
7 Day CHG~0.00%
Published-22 Jun, 2022 | 19:16
Updated-03 Aug, 2024 | 09:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PMB 7.3.10 allows reflected XSS via the id parameter in an lvl=author_see request to index.php.

Action-Not Available
Vendor-sigbn/a
Product-pmbn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-28455
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-7.3||HIGH
EPSS-0.23% / 46.15%
||
7 Day CHG~0.00%
Published-25 Jul, 2022 | 14:10
Updated-16 Sep, 2024 | 23:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-site Scripting (XSS)

This affects all versions of package markdown-it-toc. The title of the generated toc and the contents of the header are not escaped.

Action-Not Available
Vendor-markdown-it-toc_projectn/a
Product-markdown-it-tocmarkdown-it-toc
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-24426
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-5.1||MEDIUM
EPSS-0.04% / 11.66%
||
7 Day CHG~0.00%
Published-03 Feb, 2026 | 19:09
Updated-05 Mar, 2026 | 01:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda AC7 Reflected XSS via Web Interface Output Encoding

Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior contain an improper output encoding vulnerability in the web management interface. User-supplied input is reflected in HTTP responses without adequate escaping, allowing injection of arbitrary HTML or JavaScript in a victim’s browser context.

Action-Not Available
Vendor-Shenzhen Tenda Technology Co., Ltd.Tenda Technology Co., Ltd.
Product-ac7_firmwareac7Tenda AC7
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-33157
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.53% / 67.11%
||
7 Day CHG~0.00%
Published-12 Jul, 2022 | 22:36
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The libconnect extension before 7.0.8 and 8.x before 8.1.0 for TYPO3 allows XSS.

Action-Not Available
Vendor-libconnect_projectn/a
Product-libconnectn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-28119
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.75%
||
7 Day CHG~0.00%
Published-04 Oct, 2021 | 16:59
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross site scripting vulnerability in 53KF < 2.0.0.2 that allows for arbitrary code to be executed via crafted HTML statement inserted into chat window.

Action-Not Available
Vendor-53kfn/a
Product-53kfn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-3442
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.26% / 49.46%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-15 Apr, 2025 | 13:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crealogix EBICS ebics.aspx cross site scripting

A vulnerability was found in Crealogix EBICS 7.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /ebics-server/ebics.aspx. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-210374 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-crealogixCrealogix
Product-ebics_serverEBICS
CWE ID-CWE-707
Improper Neutralization
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34330
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.37% / 59.05%
||
7 Day CHG~0.00%
Published-04 Jan, 2023 | 17:07
Updated-10 Apr, 2025 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Sterling B2B Integrator cross-site scripting

IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 229469.

Action-Not Available
Vendor-Linux Kernel Organization, IncIBM CorporationMicrosoft Corporation
Product-sterling_b2b_integratoraixwindowslinux_kernelSterling B2B Integrator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-33929
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.1||MEDIUM
EPSS-0.67% / 71.44%
||
7 Day CHG~0.00%
Published-10 Aug, 2022 | 16:31
Updated-17 Sep, 2024 | 04:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in EndUserSummary page. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.

Action-Not Available
Vendor-Dell Inc.
Product-wyse_management_suiteWyse Management Suite
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34475
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.53% / 67.33%
||
7 Day CHG~0.00%
Published-22 Dec, 2022 | 00:00
Updated-15 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SVG <code>&lt;use&gt;</code> tags that referenced a same-origin document could have resulted in script execution if attacker input was sanitized via the HTML Sanitizer API. This would have required the attacker to reference a same-origin JavaScript file containing the script to be executed. This vulnerability affects Firefox < 102.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxFirefox
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-3402
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.44% / 85.28%
||
7 Day CHG~0.00%
Published-28 Oct, 2022 | 18:57
Updated-08 Apr, 2026 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Log HTTP Requests <= 1.3.1 - Stored Cross-Site Scripting

The Log HTTP Requests plugin for WordPress is vulnerable to Stored Cross-Site Scripting via logged HTTP requests in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers who can trick a site's administrator into performing an action like clicking on a link, or an authenticated user with access to a page that sends a request using user-supplied data via the server, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-facetwpmgibbs189
Product-log_http_requestsLog HTTP Requests
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34133
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.49% / 65.65%
||
7 Day CHG~0.00%
Published-27 Jun, 2022 | 23:09
Updated-30 Mar, 2026 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.

Action-Not Available
Vendor-joranin/a
Product-joranin/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-24348
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-7.4||HIGH
EPSS-0.05% / 16.17%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 09:31
Updated-05 Feb, 2026 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple cross-site scripting vulnerabilities in EZCast Pro II Dongle

Multiple cross-site scripting vulnerabilities in Admin UI of EZCast Pro II version 1.17478.146 allow attackers to execute arbitrary JavaScript code in the browser of other Admin UI users.

Action-Not Available
Vendor-nimbletechEZCast
Product-ezcast_pro_dongle_ii_firmwareezcast_pro_dongle_iiEZCast Pro II
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-33322
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.49% / 81.20%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-01 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-msz-ap25\/35\/42\/50\/60\/71vgk-er3_firmwaremsz-ay25\/35\/42\/50vgk-et1_firmwaremsz-ft25\/35\/50vgk-sc2_firmwaremsxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1mac-588if-ema-ew85s-uk_firmwaremsz-bt20\/25\/35\/50vgk-et2_firmwares-mac-002if_firmwaremsz-bt20\/25\/35\/50vgk-et3_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2_firmwaremsz-gzy09\/12\/18vfkmac-587if2-emsz-ap25\/35\/42\/50\/60\/71vgk-et3msz-ay25\/35\/42\/50vgkp-et1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e2_firmwaremsz-ln25\/35\/50\/60vg2v-er3msz-ln25\/35\/50vg2r-en2_firmwaremsz-ap25\/35\/42\/50vgk-en2msz-ft25\/35\/50vgk-sc1msz-ln25\/35\/50vg2r-en2msz-wx18\/20\/25vfk_firmwaremsy-gp10\/13\/15\/18\/20\/24vfk-sg1msz-ap25\/35\/42\/50vgk-er1_firmwarema-ew85s-emsz-bt20\/25\/35\/50vgk-er1msz-ln18\/25\/35\/50\/60vg2w-e2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er2msz-ln18\/25\/35\/50\/60vg2v-e3_firmwaremsz-ln25\/35\/50\/60vg2v-a2_firmwaremsz-ef22\/25\/35\/42\/50vgks-et1_firmwaremsz-rw25\/35\/50vg-sc1_firmwaremsz-bt20\/25\/35\/50vgk-et2msz-ln25\/35\/50\/60vg2v-er2msz-ln25\/35\/50vg2b-en2mac-507if-e_firmwaremsz-wx18\/20\/25vfkmac-507if-emsz-ln25\/35\/50\/60vg2r-et3msz-exa09\/12vakmsxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-et2msz-ef18\/22\/25\/35\/42\/50vgkb-e2_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e3msz-ay25\/35\/42\/50vgk-er1msz-ln25\/35\/50\/60vg2b-et3msz-ay25\/35\/42\/50vgk-e6_firmwaremsz-bt20\/25\/35\/50vgk-er2_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1_firmwaremsz-bt20\/25\/35\/50vgk-et1msz-ef22\/25\/35\/42\/50vgkw-et1_firmwaremac-588if-e_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-e1_firmwaremsz-rw25\/35\/50vg-et1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er2_firmwaremsz-bt20\/25\/35\/50vgk-e3_firmwaremsz-ay25\/35\/42\/50vgkp-er1msz-ef22\/25\/35\/42\/50vgkb-er1msz-ln25\/35\/50vg2v-sc1_firmwaremsz-ap25\/35\/42\/50vgk-er1msz-ap25\/35\/42\/50vgk-en3msz-ef22\/25\/35\/42\/50vgkb-et2_firmwaremsz-ef22\/25\/35\/42\/50vgks-er2msz-ln25\/35\/50vg2w-en2msz-ef22\/25\/35\/42\/50vgkw-a1_firmwaremsz-hr25\/35\/42\/50vfk-e6_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e2msz-ln18\/25\/35\/50\/60vg2r-e3_firmwaremsz-ln25\/35\/50\/60vg2r-er3msz-ln25\/35\/50\/60vg2w-et3_firmwaremsz-bt20\/25\/35\/50vgk-e2msz-ef22\/25\/35\/42\/50vgkb-et1msz-ay25\/35\/42\/50vgkp-sc1_firmwaremsz-bt20\/25\/35\/50vgk-e2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er1_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2msz-ln25\/35\/50\/60vg2r-er2_firmwaremsz-ln25\/35\/50\/60vg2r-a2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-et1_firmwaremsz-ft25\/35\/50vgk-et1msz-ft25\/35\/50vgk-e1_firmwaremsz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2_firmwaremsz-ap25\/35\/42\/50vgk-et1msz-ef22\/25\/35\/42\/50vgkb-a1msz-ft25\/35\/50vgk-sc2mfz-gxt50\/60\/73vfk_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-e3msz-hr25\/35\/42\/50\/60\/71vfk-er1msz-ln25\/35\/50vg2b-sc1msz-rw25\/35\/50vg-e1_firmwaremsz-rw25\/35\/50vg-e1msz-ln25\/35\/50\/60vg2w-et3mac-587if2-e_firmwaremsz-ln25\/35\/50\/60vg2v-et3_firmwaremsz-ay25\/35\/42\/50vgkp-e6msy-gp10\/13\/15\/18\/20\/24vfk-sg1_firmwaremsz-ap25\/35\/42\/50vgk-e7_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e1msz-ef22\/25\/35\/42\/50vgks-et2msz-ef22\/25\/35\/42\/50vgkw-et1msz-hr25\/35\/42\/50vfk-e6msz-ln25\/35\/50\/60vg2b-et2_firmwaremsz-ln25\/35\/50\/60vg2b-et3_firmwaremsz-ef22\/25\/35\/42\/50vgks-er2_firmwaremsz-ef22\/25\/35\/42\/50vgks-a1_firmwaremsz-ap25\/35\/42\/50vgk-en1_firmwaremsz-ay25\/35\/42\/50vgkp-e6_firmwaremsz-ln25\/35\/50\/60vg2r-er3_firmwaremsz-ln25\/35\/50\/60vg2r-et2msz-rw25\/35\/50vg-et1msz-bt20\/25\/35\/50vgk-e1_firmwaremsz-ln25\/35\/50\/60vg2b-er2msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2_firmwaremsz-ap25\/35\/42\/50vgk-e7msz-ay25\/35\/42\/50vgk-e6msz-ln18\/25\/35\/50\/60vg2b-e2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e1msz-ln25\/35\/50\/60vg2v-er3_firmwaremsz-ln25\/35\/50\/60vg2b-er3msz-ay25\/35\/42\/50vgk-e1_firmwaremfz-xt50\/60vfk_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e2msz-bt20\/25\/35\/50vgk-er2msz-ft25\/35\/50vgk-e2_firmwaremsz-ln25\/35\/50\/60vg2b-et2msz-ln25\/35\/50\/60vg2v-a2msz-gzy09\/12\/18vfk_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e2msz-ay25\/35\/42\/50vgk-et1msz-ln18\/25\/35\/50\/60vg2b-e3msz-ay25\/35\/42\/50vgkp-et1msz-ay25\/35\/42\/50vgk-sc1msz-ef22\/25\/35\/42\/50vgkw-a1msz-ef18\/22\/25\/35\/42\/50vgks-e1_firmwaremsz-eza09\/12vakmsz-ef22\/25\/35\/42\/50vgks-et1msz-ln25\/35\/50\/60vg2r-et2_firmwaremsz-ft25\/35\/50vgk-sc1_firmwaremsz-rw25\/35\/50vg-sc1msz-ln25\/35\/50\/60vg2r-et3_firmwaremsz-ln25\/35\/50vg2w-en2_firmwaremfz-xt50\/60vfkmsz-ap25\/35\/42\/50vgk-e8_firmwaremsz-ef22\/25\/35\/42\/50vgkw-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e3_firmwaremsz-ln25\/35\/50\/60vg2v-et2_firmwaremsz-ln25\/35\/50\/60vg2v-et3msz-bt20\/25\/35\/50vgk-et3mac-587if-e_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e1_firmwaremsz-ay25\/35\/42\/50vgk-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e3msz-ln25\/35\/50\/60vg2b-a2_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-et1_firmwares-mac-002ifmsz-ef22\/25\/35\/42\/50vgks-a1msz-ln25\/35\/50vg2r-sc1_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-et1mfz-gxt50\/60\/73vfkmsz-ap25\/35\/42\/50vgk-en1msz-ap25\/35\/42\/50vgk-e1msz-ap25\/35\/42\/50\/60\/71vgk-e3_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et2msz-ln25\/35\/50\/60vg2v-er2_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-e1msz-ef22\/25\/35\/42\/50vgkw-er2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-a1_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-et3_firmwaremsz-ef22\/25\/35\/42\/50vgkw-er1msz-ft25\/35\/50vgk-e2msz-ln25\/35\/50vg2v-en2_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2msz-ef18\/22\/25\/35\/42\/50vgkw-e2msz-ay25\/35\/42\/50vgkp-sc1msz-ln18\/25\/35\/50\/60vg2w-et2_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er2msz-ln25\/35\/50\/60vg2r-a2msz-ln25\/35\/50vg2b-sc1_firmwaremsz-bt20\/25\/35\/50vgk-e1msz-zy09\/12\/18vfkmsz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2msz-ln25\/35\/50\/60vg2w-er3ma-ew85s-ukmsz-ln25\/35\/50\/60vg2r-er2msz-ln18\/25\/35\/50\/60vg2w-e3msz-ap25\/35\/42\/50vgk-et1_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-er1_firmwaremsz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1_firmwaremsz-bt20\/25\/35\/50vgk-e3msz-rw25\/35\/50vg-er1_firmwaremsz-ln25\/35\/50\/60vg2w-er3_firmwaremsz-ln25\/35\/50\/60vg2b-er3_firmwarema-ew85s-e_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1msz-ln18\/25\/35\/50\/60vg2r-e2_firmwaremsz-ay25\/35\/42\/50vgk-e1msz-rw25\/35\/50vg-er1msz-ln25\/35\/50\/60vg2v-et2msz-ef22\/25\/35\/42\/50vgkw-et2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e2msz-ln18\/25\/35\/50vg2w-sc1_firmwaremsz-ap25\/35\/42\/50vgk-en3_firmwaremsz-ay25\/35\/42\/50vgk-sc1_firmwaremsz-ft25\/35\/50vgk-et1_firmwaremsz-ln25\/35\/50vg2v-en2msz-bt20\/25\/35\/50vgk-et1_firmwaremac-587if-emsz-ln25\/35\/50vg2v-sc1msz-ln18\/25\/35\/50\/60vg2v-e2msz-ky09\/12\/18vfkmsz-ef22\/25\/35\/42\/50vgks-et2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e3_firmwaremsz-ln25\/35\/50vg2r-sc1msz-ef22\/25\/35\/42\/50vgkb-er2_firmwaremsz-zy09\/12\/18vfk_firmwaremsz-ap25\/35\/42\/50vgk-e8msz-ln25\/35\/50\/60vg2b-er2_firmwaremsz-ap25\/35\/42\/50vgk-en2_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et2msz-ln25\/35\/50\/60vg2b-a2msz-ap25\/35\/42\/50vgk-e1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e2_firmwaremsz-ln25\/35\/50vg2b-en2_firmwaremsz-ft25\/35\/50vgk-e1msz-ln18\/25\/35\/50\/60vg2w-e2msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2_firmwaremsz-ay25\/35\/42\/50vgkp-er1_firmwaremsz-eza09\/12vak_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-er3msz-ln18\/25\/35\/50vg2w-sc1msz-ef22\/25\/35\/42\/50vgkw-er2msz-exa09\/12vak_firmwaremsz-bt20\/25\/35\/50vgk-er1_firmwaremsz-ky09\/12\/18vfk_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET1Air Conditioning MSZ-AY25/35/42/50VGKP-ER1Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E1Air Conditioning MSZ-EF22/25/35/42/50VGKS-ER2Air Conditioning MSZ-LN18/25/35/50/60VG2W-E3Air Conditioning MSZ-LN25/35/50/60VG2V-ER2Air Conditioning MSZ-LN25/35/50/60VG2R-ER2Remote control with Wi-Fi Interface RMCB-D6SE-TAir Conditioning MSZ-LN25/35/50/60VG2R-ET2Air Conditioning MSZ-AY25/35/42/50VGKP-SC1Air Conditioning MSZ-LN25/35/50/60VG2V-ET3Air Conditioning MSZ-LN18/25/35/50/60VG2B-E3Remote control with Wi-Fi Interface RMCB-F6SE-TAir Conditioning MSZ-BT20/25/35/50VGK-E2Wi-Fi Interface GT-RA2Air Conditioning MSZ-EZA09/12VAKWi-Fi Interface GT-RA1Air Conditioning MSZ-HR25/35/42/50VFK-E6Air Conditioning MSZ-LN25/35/50/60VG2R-A2Air Conditioning MSZ-ZY09/12/18VFKAir Conditioning MSZ-LN25/35/50/60VG2W-ET3Mitsubishi Electric HEMS control adapter P-HM04WAAir Conditioning MSZ-AY25/35/42/50VGK-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET2Air Conditioning MSZ-LN25/35/50/60VG2R-ER3Air Conditioning MSZ-AP25/35/42/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ER3Air Conditioning MSZ-LN25/35/50/60VG2B-A2Air Conditioning MSZ-LN25/35/50VG2R-EN2Air Conditioning MSZ-FD40/56/63/71/8022SSmart Switch P-10SWRCAir Conditioning MSZ-RW25/35/50VG-ER1Remote control with Wi-Fi Interface RMCB-H6SE-TAir Conditioning MSZ-LN25/35/50/60VG2V-ET2Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9020(S)Air Conditioning MSZ-AP25/35/42/50VGK-E7Air Conditioning MSZ-AP22/25/35/42/50/60/71/80VGKD-A2Air Conditioning MSZ-AY25/35/42/50VGK-E6Air Conditioning MSZ-LN18/25/35/50/60VG2R-E3Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ER1Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ET2Refrigerator MR-WXD52/60/70GAir Conditioning MSZ-LN25/35/50/60VG2W-ER3Air Conditioning MSZ-EF22/25/35/42/50VGKS-A1Wi-Fi Interface MAC-588IF-EAir Conditioning MSZ-KY09/12/18VFKAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ER3Air Conditioning MSZ-BT20/25/35/50VGK-ER2Air Conditioning MSZ-EF22/25/35/42/50VGKS-ER1Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9021(S)Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ER2Air Conditioning MSZ-LN18/25/35/50/60VG2W-ET2Air Conditioning MSZ-RW25/35/50VG-E1Air Conditioning MSZ-HXV25/28/40/56/63/71/8022SAir Conditioning MSZ-EF22/25/35/42/50VGKB-ER2Air Conditioning MSZ-BT20/25/35/50VGK-ET3Air Conditioning MSZ-AP25/35/42/50VGK-EN2Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9021(S)Air Conditioning MSZ-AY25/35/42/50VGK-ER1Wi-Fi Interface GT-HR1Rice cooker NJ-AWBX10Smart Switch P-1600SWRCRefrigerator MR-WZ55/61HAir Conditioning MSZ-FZV40/56/63/71/80/9020SAir Conditioning MSZ-LN18/25/35/50VG2W-SC1Air Purifier MA-EW85S-EBATHROOM THERMO VENTILATOR WD-240DK2-RCBATHROOM THERMO VENTILATOR V-241BZ5-RCAir Conditioning MSZ-LN18/25/35/50/60VG2B-E2Air Conditioning MSZ-LN25/35/50/60VG2V-A2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E3Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E2Air Conditioning MFZ-GXT50/60/73VFKAir Conditioning MSZ-LN18/25/35/50/60VG2W-E2Air Conditioning MSZ-EF22/25/35/42/50VGKW-A1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ET1Smart Switch P-04SWRCBATHROOM THERMO VENTILATOR V-241BZ-RCAir Conditioning MSZ-LN18/25/35/50/60VG2W-ER2Air Conditioning MSZ-AP22/25/35/42/50/61/70/80VGKD-A1Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9021E9(S)Air Conditioning MSZ-BT20/25/35/50VGK-ET2Air Conditioning MSZ-FZ40/56/63/71/80/9021SAir Conditioning MSZ-AP25/35/42/50VGK-EN1Air Conditioning MSZ-LN25/35/50VG2V-SC1Air Conditioning MSZ-FT25/35/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ET3Air Conditioning MSZ-AP25/35/42/50/60/71VGK-E3Air Conditioning MSZ-FT25/35/50VGK-E2Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9020E8(S)Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E1Air Conditioning MSZ-BT20/25/35/50VGK-E3HEMS adapter GT-HEM4Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E2Wi-Fi Interface MAC-900IFAir Conditioning MSZ-LN25/35/50VG2B-SC1Refrigerator MR-MZ54/60HAir Conditioning MSZ-EF18/22/25/35/42/50VGKB-E1Air Conditioning MSZ-EF22/25/35/42/50VGKB-ER1Air Conditioning MSZ-FZV40/56/63/71/80/9021SAir Conditioning MSZ-EF18/22/25/35/42/50VGKS-E2Wi-Fi Interface PAC-SK43MLAir Conditioning MSZ-BT20/25/35/50VGK-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER2Air Conditioning MSZ-LN25/35/50VG2W-EN2Air Conditioning MSZ-LN25/35/50/60VG2V-ER3Air Conditioning MSZ-LN25/35/50/60VG2R-ET3Air Conditioning MSZ-AY25/35/42/50VGK-SC1Air Conditioning MFZ-XT50/60VFKAir Conditioning MSZ-AP25/35/42/50VGK-EN3BATHROOM THERMO VENTILATOR WD-240DK-RCAir Conditioning MSZ-BT20/25/35/50VGK-ER1Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET2Air Purifier MA-EW85S-UKAir Conditioning MSZ-BT20/25/35/50VGK-E1Air Conditioning MSZ-WX18/20/25VFKAir Conditioning MSZ-AP25/35/42/50VGK-E8Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-E2Energy Recovery Ventilator VL-200ZMHSV3-RCWi-Fi Interface MAC-587IF2-EAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ET3Air Conditioning MSZ-VXV40/56/63/71/8022SAir Conditioning MSZ-LN25/35/50VG2R-SC1Air Conditioning MSZ-LN25/35/50/60VG2B-ER2Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER1Air Conditioning MSZ-EXA09/12VAKAir Conditioning MSZ-GZY09/12/18VFKAir Conditioning MSZ-LN25/35/50/60VG2B-ET2Wi-Fi Interface MAC-587IF-EAir Conditioning MSZ-AY25/35/42/50VGKP-ET1Air Conditioning MSZ-RW25/35/50VG-ET1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-E1Air Conditioning MSZ-LN18/25/35/50/60VG2R-E2Air Conditioning MSZ-FZ40/56/63/71/80/9020SAir Conditioning MSZ-EF22/25/35/42/50VGKB-A1Air Conditioning MSZ-AP25/35/42/50VGK-ER1Wi-Fi Interface MAC-507IF-EAir Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9020(S)Wi-Fi Interface S-MAC-002IFAir Conditioning MSZ-EF22/25/35/42/50VGKS-ET1Air Conditioning MSZ-FT25/35/50VGK-SC2Air Conditioning MSZ-LN25/35/50VG2V-EN2Air Conditioning MSZ-AY25/35/42/50VGK-E1Air Conditioning MSY-GP10/13/15/18/20/24VFK-SG1Air Conditioning MSZ-FT25/35/50VGK-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E2Air Conditioning MSZ-FT25/35/50VGK-SC1Air Conditioning MSZ-AY25/35/42/50VGKP-E6Refrigerator MR-MXD50/57GAir Conditioning MSZ-AP25/35/42/50VGK-ET1Wi-Fi Interface P-WA01Air Conditioning MSZ-ZD25/28/40/56/63/71/8022(S)Air Conditioning MSZ-RW25/35/50VG-SC1Air Conditioning MSXY-FP05/07/10/13/18/20/24VGK-SG1Air Conditioning MSZ-LN25/35/50VG2B-EN2
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-3440
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 56.02%
||
7 Day CHG~0.00%
Published-31 Oct, 2022 | 00:00
Updated-06 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rock Convert < 2.6.0 - Reflected Cross-Site Scripting

The Rock Convert WordPress plugin before 2.11.0 does not sanitise and escape an URL before outputting it back in an attribute when a specific widget is present on a page, leading to a Reflected Cross-Site Scripting

Action-Not Available
Vendor-rockcontentUnknown
Product-rock_convertRock Convert
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-27974
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.75%
||
7 Day CHG~0.00%
Published-28 Oct, 2020 | 14:31
Updated-04 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NeoPost Mail Accounting Software Pro 5.0.6 allows php/Commun/FUS_SCM_BlockStart.php?code= XSS.

Action-Not Available
Vendor-quadientn/a
Product-mail_accountingn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-3339
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-5.4||MEDIUM
EPSS-0.64% / 70.78%
||
7 Day CHG~0.00%
Published-18 Oct, 2022 | 00:00
Updated-08 May, 2025 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected XSS in Trellix ePO server

A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 Update 14 allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator's session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO.

Action-Not Available
Vendor-Musarubra US LLC (Trellix)McAfee, LLC
Product-epolicy_orchestratorTrellix ePolicy Orchestrator (ePO)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-2427
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.10% / 26.32%
||
7 Day CHG~0.00%
Published-21 Mar, 2026 | 03:26
Updated-22 Apr, 2026 | 21:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
itsukaita <= 0.1.2 - Reflected Cross-Site Scripting via 'day_from' Parameter

The itsukaita plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'day_from' and 'day_to' parameters in all versions up to, and including, 0.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-kazunii
Product-itsukaita
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-33978
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.1||MEDIUM
EPSS-0.21% / 43.20%
||
7 Day CHG~0.00%
Published-11 Oct, 2022 | 17:00
Updated-28 Apr, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress FontMeister plugin <= 1.08 - Reflected Cross-Site Scripting (XSS) vulnerability

Reflected Cross-Site Scripting (XSS) vulnerability FontMeister plugin <= 1.08 at WordPress.

Action-Not Available
Vendor-fontmeister_projectSayontan Sinha
Product-fontmeisterFontMeister (WordPress plugin)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34093
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-2.52% / 85.51%
||
7 Day CHG~0.00%
Published-14 Jul, 2022 | 21:24
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via access_token.php.

Action-Not Available
Vendor-softwarepublicon/a
Product-i3geon/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34025
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.23% / 45.62%
||
7 Day CHG~0.00%
Published-19 Jul, 2022 | 18:20
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vesta v1.0.0-5 was discovered to contain a cross-site scripting (XSS) vulnerability via the post function at /web/api/v1/upload/UploadHandler.php.

Action-Not Available
Vendor-vestacpn/a
Product-vesta_control_paneln/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34182
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-6.1||MEDIUM
EPSS-14.81% / 94.55%
||
7 Day CHG~0.00%
Published-22 Jun, 2022 | 14:41
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Nested View Plugin 1.20 through 1.25 (both inclusive) does not escape search parameters, resulting in a reflected cross-site scripting (XSS) vulnerability.

Action-Not Available
Vendor-Jenkins
Product-nested_viewJenkins Nested View Plugin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34178
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-6.1||MEDIUM
EPSS-7.52% / 91.86%
||
7 Day CHG~0.00%
Published-22 Jun, 2022 | 14:41
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.

Action-Not Available
Vendor-Jenkins
Product-embeddable_build_statusJenkins Embeddable Build Status Plugin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34305
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-6.1||MEDIUM
EPSS-16.85% / 95.00%
||
7 Day CHG~0.00%
Published-23 Jun, 2022 | 10:30
Updated-03 Aug, 2024 | 09:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in examples web application

In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.

Action-Not Available
Vendor-The Apache Software Foundation
Product-tomcatApache Tomcat
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-27366
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 23.10%
||
7 Day CHG~0.00%
Published-28 Aug, 2023 | 00:00
Updated-02 Oct, 2024 | 14:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross Site Scripting (XSS) vulnerability in wlscanresults.html in Humax HGB10R-02 BRGCAB version 1.0.03, allows local attackers to execute arbitrary code.

Action-Not Available
Vendor-humaxdigitaln/ahumaxdigital
Product-hgb10r-02_firmwarehgb10r-02n/ahgb10r-02_firmware
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-24415
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 5.57%
||
7 Day CHG~0.00%
Published-03 Mar, 2026 | 21:51
Updated-05 Mar, 2026 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenSTAManager affected by reflected XSS in modifica_iva.php via righe parameter

OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contains Reflected XSS vulnerabilities in invoice/order/contract modification modals. The application fails to properly sanitize user-supplied input from the righe GET parameter before reflecting it in HTML output.The $_GET['righe'] parameter is directly echoed into the HTML value attribute without any sanitization using htmlspecialchars() or equivalent functions. This allows an attacker to break out of the attribute context and inject arbitrary HTML/JavaScript.

Action-Not Available
Vendor-devcodedevcode-it
Product-openstamanageropenstamanager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34562
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.19% / 40.55%
||
7 Day CHG~0.00%
Published-22 Apr, 2024 | 00:00
Updated-22 Apr, 2025 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) vulnerability in PHPFox v4.8.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the status box.

Action-Not Available
Vendor-phpfoxn/a
Product-phpfoxn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34257
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-6.1||MEDIUM
EPSS-0.77% / 73.59%
||
7 Day CHG~0.00%
Published-16 Aug, 2022 | 19:46
Updated-23 Apr, 2025 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Adobe Commerce Stored XSS Arbitrary code execution

Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

Action-Not Available
Vendor-magentoAdobe Inc.
Product-magentocommerceMagento Commerce
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34092
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 60.40%
||
7 Day CHG~0.00%
Published-14 Jul, 2022 | 21:24
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via svg2img.php.

Action-Not Available
Vendor-softwarepublicon/a
Product-i3geon/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-24674
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.07% / 21.11%
||
7 Day CHG~0.00%
Published-03 Feb, 2026 | 16:57
Updated-10 Feb, 2026 | 17:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open eClass is Vulnerable to Reflected Cross-Site Scripting (XSS) in Multiple Endpoints

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Reflected Cross-Site Scripting (XSS) vulnerability allows remote attackers to execute arbitrary JavaScript in the context of authenticated users by crafting malicious URLs and tricking victims into visiting them. This issue has been patched in version 4.2.

Action-Not Available
Vendor-gunetgunet
Product-open_eclass_platformopeneclass
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-28038
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-16.02% / 94.83%
||
7 Day CHG~0.00%
Published-31 Oct, 2020 | 00:59
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WordPress before 5.5.2 allows stored XSS via post slugs.

Action-Not Available
Vendor-n/aDebian GNU/LinuxWordPress.orgFedora Project
Product-wordpressdebian_linuxfedoran/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34094
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.91% / 83.42%
||
7 Day CHG~0.00%
Published-14 Jul, 2022 | 21:24
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via request_token.php.

Action-Not Available
Vendor-softwarepublicon/a
Product-i3geon/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-27428
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.75%
||
7 Day CHG~0.00%
Published-05 Jan, 2022 | 23:37
Updated-04 Aug, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DOM-based cross-site scripting (XSS) vulnerability in Scratch-Svg-Renderer v0.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted sb3 file.

Action-Not Available
Vendor-n/aMIT (Massachusetts Institute of Technology)
Product-scratch-svg-renderern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34163
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.49% / 65.74%
||
7 Day CHG~0.00%
Published-01 Aug, 2022 | 15:41
Updated-16 Sep, 2024 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM CICS TX 11.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 229333.

Action-Not Available
Vendor-IBM Corporation
Product-cics_txCICS TX AdvancedCICS TX Standard
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-34007
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.15% / 78.61%
||
7 Day CHG~0.00%
Published-07 Jul, 2022 | 11:14
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EQS Integrity Line Professional through 2022-07-01 allows a stored XSS via a crafted whistleblower entry.

Action-Not Available
Vendor-eqsn/a
Product-integrity_linen/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-3209
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-0.23% / 45.59%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-03 Aug, 2024 | 01:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Soledad < 8.2.5 - Reflected Cross-site Scripting

The soledad WordPress theme before 8.2.5 does not sanitise the {id,datafilter[type],...} parameters in its penci_more_slist_post_ajax AJAX action, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.

Action-Not Available
Vendor-pencidesignUnknown
Product-soledadsoledad
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-25148
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 6.06%
||
7 Day CHG~0.00%
Published-03 Feb, 2026 | 21:12
Updated-10 Feb, 2026 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qwik SSR XSS via Unsafe Virtual Node Serialization

Qwik is a performance focused javascript framework. Prior to version 1.19.0, a Cross-Site Scripting vulnerability in Qwik.js' server-side rendering virtual attribute serialization allows a remote attacker to inject arbitrary web scripts into server-rendered pages via virtual attributes. Successful exploitation permits script execution in a victim's browser in the context of the affected origin. This issue has been patched in version 1.19.0.

Action-Not Available
Vendor-qwikQwikDev
Product-qwikqwik
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-24778
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.02% / 3.99%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 21:57
Updated-02 Feb, 2026 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ghost vulnerable to XSS via malicious Portal preview links

Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaScript with the victim's permissions, potentially leading to account takeover. Ghost Portal versions 2.29.1 through 2.51.4 and 2.52.0 through 2.57.0 were vulnerable to this issue. Ghost automatically loads the latest patch of the members Portal component via CDN. For Ghost 5.x users, upgrading to v5.121.0 or later fixes the vulnerability. v5.121.0 loads Portal v2.51.5, which contains the patch. For Ghost 6.x users, upgrading to v6.15.0 or later fixes the vulnerability. v6.15.0 loads Portal v2.57.1, which contains the patch. For Ghost installations using a customized or self-hosted version of Portal, it will be necessary to manually rebuild from or update to the latest patch version.

Action-Not Available
Vendor-ghostTryGhost
Product-ghostportalGhost
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-2431
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.10% / 26.32%
||
7 Day CHG~0.00%
Published-07 Mar, 2026 | 01:21
Updated-22 Apr, 2026 | 21:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CM Custom Reports <= 1.2.7 - Reflected Cross-Site Scripting via 'date_from' and 'date_to' Parameters

The CM Custom Reports plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'date_from' and 'date_to' parameters in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-creativemindssolutions
Product-CM Custom Reports – Flexible reporting to track what matters most
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-25154
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.02% / 4.35%
||
7 Day CHG~0.00%
Published-30 Jan, 2026 | 21:59
Updated-04 Feb, 2026 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LocalSend has Stored XSS in Web Share Interface via Filename

LocalSend is a free, open-source app that allows users to share files and messages with nearby devices over their local network without needing an internet connection. In versions up to and including 1.17.0, when a user initiates a "Share via Link" session, the LocalSend application starts a local HTTP server to host the selected files. The client-side logic for this web interface is contained in `app/assets/web/main.js`. Note that at [0], the `handleFilesDisplay` function constructs the HTML for the file list by iterating over the files received from the server. Commit 8f3cec85aa29b2b13fed9b2f8e499e1ac9b0504c contains a patch.

Action-Not Available
Vendor-localsend
Product-localsend
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-33119
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.96% / 83.64%
||
7 Day CHG~0.00%
Published-21 Jun, 2022 | 13:00
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NUUO Network Video Recorder NVRsolo v03.06.02 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via login.php.

Action-Not Available
Vendor-n/aNUUO Inc.
Product-nvrsolo_firmwarenvrsolon/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-32209
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-6.1||MEDIUM
EPSS-4.57% / 89.27%
||
7 Day CHG~0.00%
Published-24 Jun, 2022 | 00:00
Updated-03 Nov, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```<%= sanitize @comment.body, tags: ["select", "style"] %>```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["select", "style"])```All users overriding the allowed tags by any of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).

Action-Not Available
Vendor-n/aFedora ProjectRuby on RailsDebian GNU/Linux
Product-fedoradebian_linuxrails_html_sanitizershttps://github.com/rails/rails-html-sanitizer
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-3223
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-4.3||MEDIUM
EPSS-0.34% / 57.01%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 10:50
Updated-03 Aug, 2024 | 01:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-site Scripting (XSS) - Stored in jgraph/drawio

Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 20.3.1.

Action-Not Available
Vendor-diagramsjgraph
Product-drawiojgraph/drawio
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-32308
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.16% / 36.87%
||
7 Day CHG~0.00%
Published-13 Jul, 2022 | 19:50
Updated-03 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross Site Scripting (XSS) vulnerability in uBlock Origin extension before 1.41.1 allows remote attackers to run arbitrary code via a spoofed 'MessageSender.url' to the browser renderer process.

Action-Not Available
Vendor-ublock_origin_projectn/a
Product-ublock_originn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2009-2216
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-2.78% / 86.15%
||
7 Day CHG~0.00%
Published-25 Jun, 2009 | 21:00
Updated-16 Dec, 2025 | 21:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in CMD_REDIRECT in DirectAdmin 1.33.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the URI in a view=advanced request.

Action-Not Available
Vendor-directadminn/a
Product-directadminn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-32118
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-4.99% / 89.76%
||
7 Day CHG~0.00%
Published-15 Jul, 2022 | 11:13
Updated-03 Aug, 2024 | 07:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arox School ERP Pro v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the dispatchcategory parameter in backoffice.inc.php.

Action-Not Available
Vendor-aroxn/a
Product-school_erp_pron/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-31889
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.76% / 73.46%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-13 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross Site Scripting (XSS) vulnerability in audit/templates/auditlogs.tmpl.php in osTicket osTicket-plugins before commit a7842d494889fd5533d13deb3c6a7789768795ae.

Action-Not Available
Vendor-enhancesoftn/a
Product-audit_logn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-12979
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.21% / 43.43%
||
7 Day CHG~0.00%
Published-27 Dec, 2024 | 04:31
Updated-18 Feb, 2025 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Job Recruitment _all_edits.php cn_update cross site scripting

A vulnerability was found in code-projects Job Recruitment 1.0 and classified as problematic. This issue affects the function cn_update of the file /_parse/_all_edits.php. The manipulation of the argument cname leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Action-Not Available
Vendor-anishaSource Code & Projects
Product-job_recruitmentJob Recruitment
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-32145
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-6.1||MEDIUM
EPSS-0.53% / 67.11%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:21
Updated-03 Aug, 2024 | 07:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Teamcenter Active Workspace V5.2 (All versions < V5.2.9), Teamcenter Active Workspace V6.0 (All versions < V6.0.3). A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the affected application that could allow an attacker to execute malicious code by tricking users into accessing a malicious link.

Action-Not Available
Vendor-Siemens AG
Product-teamcenter_active_workspaceTeamcenter Active Workspace V6.0Teamcenter Active Workspace V5.2
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-32247
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-1.79% / 82.88%
||
7 Day CHG~0.00%
Published-12 Jul, 2022 | 20:27
Updated-03 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, is susceptible to script execution attack by an unauthenticated attacker due to improper sanitization of the User inputs while interacting on the Network. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.

Action-Not Available
Vendor-SAP SE
Product-netweaver_enterprise_portalSAP NetWeaver Enterprise Portal
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 207
  • 208
  • Next
Details not found