Total
34649 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-3958 | 1 Withstars | 1 Books-management-system | 2025-05-12 | N/A | 4.1 MEDIUM |
A vulnerability was found in withstars Books-Management-System 1.0. It has been classified as problematic. Affected is an unknown function of the file /book_edit_do.html of the component Book Edit Page. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer. | |||||
CVE-2025-3961 | 1 Withstars | 1 Books-management-system | 2025-05-12 | N/A | 4.1 MEDIUM |
A vulnerability classified as problematic has been found in withstars Books-Management-System 1.0. This affects an unknown part of the file /admin/article/add/do. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer. | |||||
CVE-2025-3965 | 1 Itwanger | 1 Paicoding | 2025-05-12 | N/A | 5.4 MEDIUM |
A vulnerability has been found in itwanger paicoding 1.0.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /article/app/post. The manipulation of the argument content leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-3962 | 1 Withstars | 1 Books-management-system | 2025-05-12 | N/A | 4.1 MEDIUM |
A vulnerability classified as problematic was found in withstars Books-Management-System 1.0. This vulnerability affects unknown code of the file /api/comment/add of the component Comment Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | |||||
CVE-2025-3970 | 1 Jsite | 1 Jsite | 2025-05-12 | N/A | 5.4 MEDIUM |
A vulnerability classified as problematic has been found in baseweb JSite up to 1.0. Affected is an unknown function of the file /sys/office/save. The manipulation of the argument Remarks leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-46657 | 1 Karaz | 1 Karazal | 2025-05-12 | N/A | 6.1 MEDIUM |
Karaz Karazal through 2025-04-14 allows reflected XSS via the lang parameter to the default URI. | |||||
CVE-2022-42117 | 1 Liferay | 2 Dxp, Liferay Portal | 2025-05-12 | N/A | 6.1 MEDIUM |
A Cross-site scripting (XSS) vulnerability in the Frontend Taglib module in Liferay Portal 7.3.2 through 7.4.3.16, and Liferay DXP 7.3 before update 6, and 7.4 before update 17 allows remote attackers to inject arbitrary web script or HTML. | |||||
CVE-2025-40627 | 2025-05-12 | N/A | N/A | ||
Reflected Cross-Site Scripting (XSS) vulnerability in AbanteCart v1.4.0, that could allow an attacker to execute JavaScript code in a victim's browser by sending the victim a malicious URL. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user, through "/eyes? [XSS_PAYLOAD]". | |||||
CVE-2025-46729 | 2025-05-12 | N/A | N/A | ||
julmud/phpDVDProfiler is an adoption of the defunct phpDVDProfiler project, which allows users to display on the web their DVD collections maintained with Invelos's DVDProfiler software. Starting in v_20230807 and prior to v_20250511, cross-site scripting in the search function. v_20250511 contains a patch for the issue. | |||||
CVE-2025-40626 | 2025-05-12 | N/A | N/A | ||
Reflected Cross-Site Scripting (XSS) vulnerability in AbanteCart v1.4.0, that could allow an attacker to execute JavaScript code in a victim's browser by sending the victim a malicious URL. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user, through "/about_us?[XSS_PAYLOAD]". | |||||
CVE-2025-47578 | 2025-05-12 | N/A | N/A | ||
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Edward Caissie BNS Twitter Follow Button allows DOM-Based XSS.This issue affects BNS Twitter Follow Button: from n/a through 0.3.8. | |||||
CVE-2024-25224 | 1 Code-projects | 1 Simple Admin Panel | 2025-05-12 | N/A | 5.4 MEDIUM |
A cross-site scripting (XSS) vulnerability in Simple Admin Panel App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Size Number parameter under the Add Size function. | |||||
CVE-2024-25207 | 1 Barangay Management System Project | 1 Barangay Management System | 2025-05-12 | N/A | 5.4 MEDIUM |
Barangay Population Monitoring System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the Add Resident function at /barangay-population-monitoring-system/masterlist.php. This vulnerabiity allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Contact Number parameter. | |||||
CVE-2024-25221 | 1 Task Manager In Php With Source Code Project | 1 Task Manager In Php With Source Code | 2025-05-12 | N/A | 6.1 MEDIUM |
A cross-site scripting (XSS) vulnerability in Task Manager App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Note Section parameter at /TaskManager/Tasks.php. | |||||
CVE-2024-6669 | 1 Quantumcloud | 1 Wpbot | 2025-05-12 | N/A | 4.8 MEDIUM |
The AI ChatBot for WordPress – WPBot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 5.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | |||||
CVE-2023-5606 | 1 Quantumcloud | 1 Wpbot | 2025-05-12 | N/A | 4.8 MEDIUM |
The ChatBot for WordPress is vulnerable to Stored Cross-Site Scripting via the FAQ Builder in versions 4.8.6 through 4.9.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. NOTE: This vulnerability is a re-introduction of CVE-2023-4253. | |||||
CVE-2023-1649 | 1 Quantumcloud | 1 Wpbot | 2025-05-12 | N/A | 4.8 MEDIUM |
The AI ChatBot WordPress plugin before 4.5.1 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | |||||
CVE-2022-47613 | 1 Quantumcloud | 1 Wpbot | 2025-05-12 | N/A | 4.8 MEDIUM |
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in QuantumCloud AI ChatBot plugin <= 4.3.0 versions. | |||||
CVE-2024-13097 | 1 Mch0lic | 1 Wp Finance | 2025-05-12 | N/A | N/A |
The WP Finance WordPress plugin through 1.3.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | |||||
CVE-2024-13218 | 1 Caspie | 1 Fast Tube | 2025-05-12 | N/A | N/A |
The Fast Tube WordPress plugin through 2.3.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. |