CVE-2020-35761
bloofoxCMS 0.5.2.1 is infected with XSS that allows remote attackers to execute arbitrary JS/HTML Code. (CVSS:0.0) (Last Update:2021-06-16)
bloofoxCMS 0.5.2.1 is infected with XSS that allows remote attackers to execute arbitrary JS/HTML Code. (CVSS:0.0) (Last Update:2021-06-16)
Jenkins Scriptler Plugin 3.1 and earlier does not escape script content, resulting in a stored cross-site scripting (XSS) vulnerability exploitable
Jenkins Scriptler Plugin 3.2 and earlier does not escape parameter names shown in job configuration forms, resulting in a stored
There is a XSS vulnerability in the ticket overview screens. It’s possible to collect various information by having an e-mail
Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to
The vulnerabilities are dependent on one another; exploitation of one of the vulnerabilities is required to exploit the other vulnerability.
Details about the vulnerabilities are as follows:
Cisco Finesse and Cisco Virtualized Voice Browser OpenSocial Gadget Editor Unauthenticated Access Vulnerability
A vulnerability in the web management interface of Cisco Finesse and Cisco Virtualized Voice Browser could allow an unauthenticated, remote attacker to access the OpenSocial Gadget Editor without providing valid user credentials.
The vulnerability is due to missing authentication for a specific section of the web-based management interface. An attacker could exploit this vulnerability by accessing a crafted URL. A successful exploit could allow the attacker to obtain access to a section of the interface, which they could use to obtain potentially confidential information and create arbitrary XML files.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CVE ID: CVE-2021-1246Bug ID(s): CSCvs52916, CSCvw27957Security Impact Rating (SIR): MediumCVSS Base Score: 6.5CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Cisco Finesse OpenSocial Gadget Editor Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CVE ID: CVE-2021-1245Bug ID(s): CSCvs52916Security Impact Rating (SIR): MediumCVSS Base Score: 6.1CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Jenkins Kiuwan Plugin 1.6.0 and earlier does not escape query parameters in an error message for a form validation endpoint,
A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it
SAP NetWeaver Application Server ABAP (Applications based on SAP GUI for HTML), versions – KRNL64NUC – 7.49, KRNL64UC – 7.49,7.53,
The Open Web Application Security Project (OWASP) periodically publishes a list of the top 10 web application security risks. The
Prophaze WAF Role Security Reliable, Automated Blocking Prophaze WAF 3.0 is a Distributed proactive web security platform designed to defend
Prophaze WAF-Role-Security Delivers Accurate, Actionable Security Gain active protection for your entire web presence. Irrespective of deployment type of your
WAF Developer Secure, Simpler, and Safer Prophaze WAF 3.0 is a Distributed proactive web security platform designed to defend against
Rate Limiting Ensuring Security and Availability Prophaze WAF API supports rate limiting to prevent and ensure the stability and reliability
OWASP TOP 10 OWASP Top 10 Web Application Vulnerabilities’ Mitigation using Prophaze WAF Prophaze web application firewall (WAF) that protects
Prophaze SSL/TLS Secure Your Web Applications with Prophaze SSL/TLS Prophaze SSL/TLS is a cloud-based platform that provides comprehensive security solutions
Microsoft Azure Simply Secure Against Web Application Threats Prophaze with Azure solutions simplifies cloud security. Deploy Prophaze to get complete
AWS WAF The Ultimate Protection Solution to Secure your Web Application Deploying Prophaze on your on-premises AWS workloads allows you
Healthcare Prophaze Ensures Secure Speed Reliability on Healthcare Prophaze helps defend against attacks like SQL injection that could compromise patient
Financial Institutions Customers Adapt to Prophaze Architectures Prophaze assists them in switching to a streamlined and secure web application protection
Education Securing Education Sectors for Comprehensive Protection Prophaze offers protection against malicious activities in off/down hours and detecting bad IP
E-Commerce Prophaze Safeguard Customer Data and Prevent Cyberattacks Prophaze can be easily configurable in either blacklist/whitelist approaches which protect all
Start-Up The Native Cloud Security Platform Kubernetes for the Start-Up Companies Prophaze WAF 3.0 is a Distributed proactive web security
Runtime Application Self-Protection (RASP) Runtime Application Self-Protection (RASP) does protect itself from many vulnerabilities in the enterprise by identifying and blocking