Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-592:Stored XSS
Attack Pattern ID:592
Version:v3.9
Attack Pattern Name:Stored XSS
Abstraction:Detailed
Status:Stable
Likelihood of Attack:High
Typical Severity:Very High
DetailsContent HistoryRelated WeaknessesReports
1Weaknesses found

CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
ShareView Details
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Likelihood of Exploit-High
Mapping-Allowed
Abstraction-Base
Found in38699CVEs

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Impacts-
Read Application DataBypass Protection MechanismExecute Unauthorized Code or Commands
Tags-
High exploitEnvironment HardeningLibraries or FrameworksInput ValidationParameterizationOutput EncodingFirewallAttack Surface ReductionEnforcement by ConversionWeb Based (technology class)Execute Unauthorized Code or Commands (impact)Bypass Protection Mechanism (impact)Read Application Data (impact)
As Seen In-
2019 CWE Top 25 Most Dangerous Software Errors2021 CWE Top 25 Most Dangerous SoftwareCISQ Data Protection Measures2020 CWE Top 25 Most Dangerous Software2022 CWE Top 25 Most Dangerous Software2023 CWE Top 25 Most Dangerous Software2024 CWE Top 25 Most Dangerous SoftwareOriginally Used by NVD from 2008 to 2016CWE Cross-section