Show filters
134 Total Results
Displaying 41-50 of 134
Sort by:
Attacker Value
Unknown

CVE-2024-2972

Disclosure Date: April 24, 2024 (last updated April 24, 2024)
The Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button WordPress plugin before 3.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
0
Attacker Value
Unknown

CVE-2024-32548

Disclosure Date: April 17, 2024 (last updated April 17, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hideki Tanaka What's New Generator allows Stored XSS.This issue affects What's New Generator: from n/a through 2.0.2.
0
Attacker Value
Unknown

CVE-2024-22551

Disclosure Date: January 26, 2024 (last updated February 02, 2024)
WhatACart v2.0.7 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /site/default/search.
Attacker Value
Unknown

CVE-2023-6595

Disclosure Date: December 14, 2023 (last updated October 16, 2024)
In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold.
Attacker Value
Unknown

CVE-2023-6368

Disclosure Date: December 14, 2023 (last updated October 16, 2024)
In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate information related to a registered device being monitored by WhatsUp Gold.
Attacker Value
Unknown

CVE-2023-6367

Disclosure Date: December 14, 2023 (last updated December 20, 2023)
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Roles.   If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Attacker Value
Unknown

CVE-2023-6366

Disclosure Date: December 14, 2023 (last updated December 20, 2023)
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Alert Center.   If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Attacker Value
Unknown

CVE-2023-6365

Disclosure Date: December 14, 2023 (last updated December 20, 2023)
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within a device group.   If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Attacker Value
Unknown

CVE-2023-6364

Disclosure Date: December 14, 2023 (last updated December 20, 2023)
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified.  It is possible for an attacker to craft a XSS payload and store that value within a dashboard component.   If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Attacker Value
Unknown

CVE-2023-5668

Disclosure Date: October 20, 2023 (last updated October 27, 2023)
The WhatsApp Share Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'whatsapp' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.