Security
Headlines
HeadlinesLatestCVEs

Tag

#xss

CVE-2023-25761: Jenkins Security Advisory 2023-02-15

Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.

CVE
#xss#csrf#vulnerability#web#java
CVE-2023-0840

A vulnerability classified as problematic was found in PHPCrazy 1.1.1. This vulnerability affects unknown code of the file admin/admin.php?action=users&mode=info&user=2. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221086 is the identifier assigned to this vulnerability.

GHSA-9w8x-5hv5-r6gw: Cross Site Scripting in usememos/memos

All versions of the package github.com/usememos/memos/server are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.

CVE-2022-25978: chore: validate external link (#1069) · usememos/memos@b11d213

All versions of the package github.com/usememos/memos/server are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.

GHSA-7hv8-3fr9-j2hv: Cross site scripting Vulnerability in backstage Software Catalog

### Impact This vulnerability allows a malicious actor with access to add or modify content in an instance of the Backstage software catalog to inject script URLs in the entities stored in the catalog. If users of the catalog then click on said URLs, that can lead to an XSS attack. ### Patches This vulnerability has been patched in both the frontend and backend implementations. The default `Link` component from `@backstage/core-components` will now reject `javascript:` URLs, and there is a global override of `window.open` to do the same. In addition the catalog model as well as the catalog backend now has additional validation built in that prevents `javascript:` URLs in known annotations. ### Workarounds The general practice of limiting access to modifying catalog content and requiring code reviews greatly helps mitigate this vulnerability. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https:/...

CVE-2023-21564

Azure DevOps Server Cross-Site Scripting Vulnerability

CVE-2023-21571

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE-2023-21572

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE-2023-21570

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE-2023-21573

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability