Total
37016 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-15870 | 1 Sonatype | 1 Nexus Repository Manager 3 | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Sonatype Nexus Repository Manager OSS/Pro versions before 3.25.1 allow XSS (Issue 2 of 2). | |||||
CVE-2020-15869 | 1 Sonatype | 1 Nexus Repository Manager 3 | 2024-11-21 | 4.3 MEDIUM | 5.4 MEDIUM |
Sonatype Nexus Repository Manager OSS/Pro versions before 3.25.1 allow XSS (issue 1 of 2). | |||||
CVE-2020-15864 | 1 Quali | 1 Cloudshell | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered in Quali CloudShell 9.3. An XSS vulnerability in the login page allows an attacker to craft a URL, with a constructor.constructor substring in the username field, that executes a payload when the user visits the /Account/Login page. | |||||
CVE-2020-15855 | 1 Redhat | 1 Bodhi | 2024-11-21 | N/A | 6.1 MEDIUM |
Two cross-site scripting vulnerabilities were fixed in Bodhi 5.6.1. | |||||
CVE-2020-15831 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
JetBrains TeamCity before 2019.2.3 is vulnerable to reflected XSS in the administration UI. | |||||
CVE-2020-15830 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
JetBrains TeamCity before 2019.2.3 is vulnerable to stored XSS in the administration UI. | |||||
CVE-2020-15803 | 4 Debian, Fedoraproject, Opensuse and 1 more | 5 Debian Linux, Fedora, Backports and 2 more | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget. | |||||
CVE-2020-15788 | 1 Siemens | 1 Polarion Subversion Webclient | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
A vulnerability has been identified in Polarion Subversion Webclient (All versions). The Polarion subversion web application does not filter user input in a way that prevents Cross-Site Scripting. If a user is enticed into passing specially crafted, malicious input to the web client (e.g. by clicking on a malicious URL with embedded JavaScript), then JavaScript code can be returned and may then be executed by the user’s client. Various actions could be triggered by running malicious JavaScript code. | |||||
CVE-2020-15781 | 1 Siemens | 2 Sicam A8000, Sicam A8000 Firmware | 2024-11-21 | 6.8 MEDIUM | 9.6 CRITICAL |
A vulnerability has been identified in SICAM WEB firmware for SICAM A8000 RTUs (All versions < V05.30). The login screen does not sufficiently sanitize input, which enables an attacker to generate specially crafted log messages. If an unsuspecting victim views the log messages via the web browser, these log messages might be interpreted and executed as code by the web application. This Cross-Site-Scripting (XSS) vulnerability might compromize the confidentiality, integrity and availability of the web application. | |||||
CVE-2020-15769 | 1 Gradle | 1 Enterprise | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered in Gradle Enterprise 2020.2 - 2020.2.4. An XSS issue exists via the request URL. | |||||
CVE-2020-15721 | 1 Rosariosis | 1 Rosariosis | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
RosarioSIS through 6.8-beta allows modules/Custom/NotifyParents.php XSS because of the href attributes for AddStudents.php and User.php. | |||||
CVE-2020-15717 | 1 Rosariosis | 1 Rosariosis | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
RosarioSIS 6.7.2 is vulnerable to XSS, caused by improper validation of user-supplied input by the Search.inc.php script. A remote attacker could exploit this vulnerability using the advanced parameter in a crafted URL. | |||||
CVE-2020-15696 | 1 Joomla | 1 Joomla\! | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered in Joomla! through 3.9.19. Lack of input filtering and escaping allows XSS attacks in mod_random_image. | |||||
CVE-2020-15676 | 3 Debian, Mozilla, Opensuse | 5 Debian Linux, Firefox, Firefox Esr and 2 more | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3. | |||||
CVE-2020-15599 | 1 Victor Cms Project | 1 Victor Cms | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field. | |||||
CVE-2020-15597 | 1 Soplanning | 1 Soplanning | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
SOPlanning 1.46.01 allows persistent XSS via the Project Name, Statutes Comment, Places Comment, or Resources Comment field. | |||||
CVE-2020-15575 | 1 Solarwinds | 1 Serv-u | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
SolarWinds Serv-U File Server before 15.2.1 allows XSS as demonstrated by Tenable Scan, aka Case Number 00484194. | |||||
CVE-2020-15573 | 1 Solarwinds | 1 Serv-u | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
SolarWinds Serv-U File Server before 15.2.1 has a "Cross-script vulnerability," aka Case Numbers 00041778 and 00306421. | |||||
CVE-2020-15562 | 2 Debian, Roundcube | 2 Debian Linux, Webmail | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists. | |||||
CVE-2020-15538 | 1 We-com | 1 Municipality Portal Cms | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
XSS can occur in We-com Municipality portal CMS 2.1.x via the cerca/ search bar. |