Vulnerabilities (CVE)

Filtered by CWE-79
Total 35377 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-10737 1 S9y 1 Serendipity 2024-11-21 3.5 LOW 5.4 MEDIUM
Serendipity 2.0.4 has XSS via the serendipity_admin.php serendipity[body] parameter.
CVE-2016-10736 1 Devpups 1 Social Pug 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
The "Social Pug - Easy Social Share Buttons" plugin before 1.2.6 for WordPress allows XSS via the wp-admin/admin.php?page=dpsp-toolkit dpsp_message_class parameter.
CVE-2016-10735 1 Getbootstrap 1 Bootstrap 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
CVE-2016-10719 1 Tp-link 2 Archer Cr700, Archer Cr700 Firmware 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
TP-Link Archer CR-700 1.0.6 devices have an XSS vulnerability that can be introduced into the admin account through a DHCP request, allowing the attacker to steal the cookie information, which contains the base64 encoded username and password.
CVE-2016-10716 1 Mail.ru 1 Calendar 2024-11-21 3.5 LOW 5.4 MEDIUM
The Mail.ru Calendar plugin before 2.5.0.61 for Atlassian Jira has XSS via the Name field in a Create Calender action, related to a MailRuCalendar.jspa#period/month URI.
CVE-2016-10715 1 Artezio 1 Kanban Board 2024-11-21 3.5 LOW 5.4 MEDIUM
The Artezio Kanban Board plugin 1.4 revision 1914 for Atlassian Jira has XSS via the Board Name in a Create New Board action, related to an artezioboard/mainPage.jspa?kanbanId=7#/kanban-view URI.
CVE-2016-10706 1 Automattic 1 Jetpack 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
The Jetpack plugin before 4.0.3 for WordPress has XSS via a crafted Vimeo link.
CVE-2016-10705 1 Automattic 1 Jetpack 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
The Jetpack plugin before 4.0.4 for WordPress has XSS via the Likes module.
CVE-2016-10549 1 Sailsjs 1 Sails 2024-11-21 2.1 LOW 4.4 MEDIUM
Sails is an MVC style framework for building realtime web applications. Version 0.12.7 and lower have an issue with the CORS configuration where the value of the origin header is reflected as the value for the Access-Control-Allow-Origin header. This would allow an attacker to make AJAX requests to vulnerable hosts through cross site scripting or a malicious HTML Document, effectively bypassing the Same Origin Policy. Note that this is only an issue when `allRoutes` is set to `true` and `origin` is set to `*` or left commented out in the sails CORS config file. The problem can be compounded when the cors `credentials` setting is not provided. At that point authenticated cross domain requests are possible.
CVE-2016-10548 1 Reduce-css-calc Project 1 Reduce-css-calc 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Arbitrary code execution is possible in reduce-css-calc node module <=1.2.4 through crafted css. This makes cross sites scripting (XSS) possible on the client and arbitrary code injection possible on the server and user input is passed to the `calc` function.
CVE-2016-10547 1 Mozilla 1 Nunjucks 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Nunjucks is a full featured templating engine for JavaScript. Versions 2.4.2 and lower have a cross site scripting (XSS) vulnerability in autoescape mode. In autoescape mode, all template vars should automatically be escaped. By using an array for the keys, such as `name[]=<script>alert(1)</script>`, it is possible to bypass autoescaping and inject content into the DOM.
CVE-2016-10537 1 Backbone Project 1 Backbone 2024-11-21 3.5 LOW 5.4 MEDIUM
backbone is a module that adds in structure to a JavaScript heavy application through key-value pairs and custom events connecting to your RESTful API through JSON There exists a potential Cross Site Scripting vulnerability in the `Model#Escape` function of backbone 0.3.3 and earlier, if a user is able to supply input. This is due to the regex that's replacing things to miss the conversion of things such as `<` to `<`.
CVE-2016-10531 1 Marked Project 1 Marked 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
marked is an application that is meant to parse and compile markdown. Due to the way that marked 0.3.5 and earlier parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (`sanitize: true`) to inject a `javascript:` URL. This flaw exists because `&#xNNanything;` gets parsed to what it could and leaves the rest behind, resulting in just `anything;` being left.
CVE-2016-10257 1 Broadcom 2 Advanced Secure Gateway, Symantec Proxysg 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
The Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (prior to 6.7.2.1), ProxySG 6.5 (prior to 6.5.10.6), ProxySG 6.6, and ProxySG 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10256.
CVE-2016-10256 1 Broadcom 1 Symantec Proxysg 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
The Symantec ProxySG 6.5 (prior to 6.5.10.6), 6.6, and 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10257.
CVE-2016-10245 1 Doxygen 1 Doxygen 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Insufficient sanitization of the query parameter in templates/html/search_opensearch.php could lead to reflected cross-site scripting or iframe injection.
CVE-2016-1000237 1 Apostrophecms 1 Sanitize-html 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
sanitize-html before 1.4.3 has XSS.
CVE-2016-1000229 2 Redhat, Smartbear 3 Jboss Fuse, Openshift, Swagger-ui 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
swagger-ui has XSS in key names
CVE-2016-1000037 2 Fedoraproject, Redhat 3 Fedora, Enterprise Linux, Pagure 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Pagure: XSS possible in file attachment endpoint
CVE-2016-1000029 1 Tenable 1 Nessus 2024-11-21 3.5 LOW 4.8 MEDIUM
Tenable Nessus before 6.8 has a stored XSS issue that requires admin-level authentication to the Nessus UI, and would potentially impact other admins (Tenable IDs 5218 and 5269).