Vulnerabilities (CVE)

Filtered by CWE-79
Total 37433 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-35752 1 Baby Care System Project 1 Baby Care System 2024-11-21 3.5 LOW 5.4 MEDIUM
Baby Care System 1.0 is affected by a cross-site scripting (XSS) vulnerability in the Edit Page tab through the Post title parameter.
CVE-2020-35748 1 Foliovision 1 Fv Flowplayer Video Player 2024-11-21 3.5 LOW 5.4 MEDIUM
Cross-site scripting (XSS) vulnerability in models/list-table.php in the FV Flowplayer Video Player plugin before 7.4.37.727 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the fv_wp_fvvideoplayer_src JSON field in the data parameter.
CVE-2020-35741 1 Hgiga 4 Msr45 Isherlock-antispam, Msr45 Isherlock-user, Ssr45 Isherlock-antispam and 1 more 2024-11-21 4.3 MEDIUM 7.0 HIGH
HGiga MailSherlock does not validate user parameters on multiple login pages. Attackers can use the vulnerability to inject JavaScript syntax for XSS attacks.
CVE-2020-35740 1 Hgiga 4 Msr45 Isherlock-antispam, Msr45 Isherlock-user, Ssr45 Isherlock-antispam and 1 more 2024-11-21 4.3 MEDIUM 7.0 HIGH
HGiga MailSherlock does not validate specific URL parameters properly that allows attackers to inject JavaScript syntax for XSS attacks.
CVE-2020-35727 1 Quest 1 Policy Authority For Unified Communications 2024-11-21 3.5 LOW 5.4 MEDIUM
Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the BrowseDirs.do file via the title parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2020-35726 1 Quest 1 Policy Authority For Unified Communications 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the /WebCM/Applications/Reports/index.jsp file via the by parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2020-35725 1 Quest 1 Policy Authority For Unified Communications 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the /WebCM/index.jsp file via the msg parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2020-35724 1 Quest 1 Policy Authority For Unified Communications 2024-11-21 3.5 LOW 5.4 MEDIUM
Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the Error.jsp file via the err parameter (or indirectly via the cpr, tcp, or abs parameter). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2020-35723 1 Quest 1 Policy Authority For Unified Communications 2024-11-21 3.5 LOW 5.4 MEDIUM
Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the ReportPreview.do file via the referer parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2020-35721 1 Quest 1 Policy Authority For Unified Communications 2024-11-21 3.5 LOW 5.4 MEDIUM
Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the BrowseAssets.do file via the title parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2020-35720 1 Quest 1 Policy Authority For Unified Communications 2024-11-21 3.5 LOW 5.4 MEDIUM
Stored XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to store malicious code in multiple fields (first name, last name, and logon name) when creating or modifying a user via the submitUser.jsp file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2020-35719 1 Quest 1 Policy Authority For Unified Communications 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the /WebCM/Applications/Search/index.jsp file via the added parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2020-35717 1 Electronjs 1 Zonote 2024-11-21 3.5 LOW 9.0 CRITICAL
zonote through 0.4.0 allows XSS via a crafted note, with resultant Remote Code Execution (because nodeIntegration in webPreferences is true).
CVE-2020-35707 1 Daybydaycrm 1 Daybyday 2024-11-21 3.5 LOW 5.4 MEDIUM
Daybyday 2.1.0 allows stored XSS via the Company Name parameter to the New Client screen.
CVE-2020-35706 1 Daybydaycrm 1 Daybyday 2024-11-21 3.5 LOW 5.4 MEDIUM
Daybyday 2.1.0 allows stored XSS via the Title parameter to the New Project screen.
CVE-2020-35705 1 Daybydaycrm 1 Daybyday 2024-11-21 3.5 LOW 5.4 MEDIUM
Daybyday 2.1.0 allows stored XSS via the Name parameter to the New User screen.
CVE-2020-35704 1 Daybydaycrm 1 Daybyday 2024-11-21 3.5 LOW 5.4 MEDIUM
Daybyday 2.1.0 allows stored XSS via the Title parameter to the New Lead screen.
CVE-2020-35698 1 Thinkific 1 Thinkific 2024-11-21 N/A 6.1 MEDIUM
Thinkific Thinkific Online Course Creation Platform 1.0 is affected by: Cross Site Scripting (XSS). The impact is: execute arbitrary code (remote). The component is: Affected Source code of the website CMS which is been used by many to host their online courses using the Thinkific Platform. The attack vector is: To exploit the vulnerability any user has to just visit the link - https://hacktify.thinkific.com/account/billing?success=%E2%80%AA%3Cscript%3Ealert(1)%3C/script%3E. ΒΆΒΆ Thinkific is a Website based Learning Platform Product which is used by thousands of users worldwide. There is a Cross Site Scripting (XSS) based vulnerability in the code of the CMS where any attacker can execute a XSS attack. Proof of Concept & Steps to Reproduce: Step1 : Go to Google.com Step 2 : Search for this Dork site:thinkific.com -www Step 3 : You will get a list of websites which are running on the thinkific domains. Step 4 : Create account and signin in any of the website Step 5 : Add this endpoint at the end of the domain and you will see that there is a XSS Alert /account/billing?success=%E2%80%AA<script>alert(1)</script> Step 6 : Choose any domains from google for any website this exploit will work on all the websites as it is a code based flaw in the CMS Step 7 : Thousands of websites are vulnerable due to this vulnerable code in the CMS itself which is giving rise to the XSS attack.
CVE-2020-35677 1 Bigprof 1 Online Invoicing System 2024-11-21 3.5 LOW 4.8 MEDIUM
BigProf Online Invoicing System before 4.0 fails to adequately sanitize fields for HTML characters upon an administrator using admin/pageEditGroup.php to create a new group, resulting in Stored XSS. The caveat here is that an attacker would need administrative privileges in order to create the payload. One might think this completely mitigates the privilege-escalation impact as there is only one high-privileged role. However, it was discovered that the endpoint responsible for creating the group lacks CSRF protection.
CVE-2020-35676 1 Bigprof 1 Online Invoicing System 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
BigProf Online Invoicing System before 3.1 fails to correctly sanitize an XSS payload when a user registers using the self-registration functionality. As such, an attacker can input a crafted payload that will execute upon the application's administrator browsing the registered users' list. Once the arbitrary Javascript is executed in the context of the admin, this will cause the attacker to gain administrative privileges, effectively leading into an application takeover. This affects app/membership_signup.php and app/admin/pageViewMembers.php.