Export limit exceeded: 24717 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 44462 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (44462 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2019-16982 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to v4.5.7, the file app\access_controls\access_control_nodes.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. | ||||
| CVE-2019-16981 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to v4.5.7, the file app\conference_profiles\conference_profile_params.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS. | ||||
| CVE-2019-16979 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to v4.5.7, the file app\contacts\contact_urls.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. | ||||
| CVE-2019-16978 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to v4.5.7, the file app\devices\device_settings.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS. | ||||
| CVE-2019-16977 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to 4.5.7, the file app\extensions\extension_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS. | ||||
| CVE-2019-16976 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to 4.5.7, the file app\destinations\destination_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS. | ||||
| CVE-2019-16975 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to 4.5.7, the file app\contacts\contact_notes.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. | ||||
| CVE-2019-16974 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to 4.5.7, the file app\contacts\contact_times.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. | ||||
| CVE-2019-16973 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to 4.5.7, the file app\contacts\contact_edit.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS. | ||||
| CVE-2019-16972 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to 4.5.7, the file app\contacts\contact_addresses.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. | ||||
| CVE-2019-16971 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to 4.5.7, the file app\messages\messages_thread.php uses an unsanitized "contact_uuid" variable coming from the URL, which is reflected on 3 occasions in HTML, leading to XSS. | ||||
| CVE-2019-16970 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to 4.5.7, the file app\sip_status\sip_status.php uses an unsanitized "savemsg" variable coming from the URL, which is reflected in HTML, leading to XSS. | ||||
| CVE-2019-16969 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| In FusionPBX up to 4.5.7, the file app\fifo_list\fifo_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS. | ||||
| CVE-2019-16968 | 1 Fusionpbx | 1 Fusionpbx | 2024-11-21 | 6.1 Medium |
| An issue was discovered in FusionPBX up to 4.5.7. In the file app\conference_controls\conference_control_details.php, an unsanitized id variable coming from the URL is reflected in HTML on 2 occasions, leading to XSS. | ||||
| CVE-2019-16967 | 2 Freepbx, Sangoma | 2 Manager, Freepbx | 2024-11-21 | 6.1 Medium |
| An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager module form (html\admin\modules\manager\views\form.php), an unsanitized managerdisplay variable coming from the URL is reflected in HTML, leading to XSS. It can be requested via GET request to /config.php?type=tool&display=manager. | ||||
| CVE-2019-16966 | 2 Freepbx, Sangoma | 2 Contactmanager, Freepbx | 2024-11-21 | 6.1 Medium |
| An issue was discovered in Contactmanager 13.x before 13.0.45.3, 14.x before 14.0.5.12, and 15.x before 15.0.8.21 for FreePBX 14.0.10.3. In the Contactmanager class (html\admin\modules\contactmanager\Contactmanager.class.php), an unsanitized group variable coming from the URL is reflected in HTML on 2 occasions, leading to XSS. It can be requested via a GET request to /admin/ajax.php?module=contactmanager. | ||||
| CVE-2019-16962 | 1 Zohocorp | 1 Manageengine Desktop Central | 2024-11-21 | 5.4 Medium |
| Zoho ManageEngine Desktop Central 10.0.430 allows HTML injection via a modified Report Name in a New Custom Report. | ||||
| CVE-2019-16961 | 1 Solarwinds | 1 Web Help Desk | 2024-11-21 | 5.4 Medium |
| SolarWinds Web Help Desk 12.7.0 allows XSS via a Schedule Name. | ||||
| CVE-2019-16960 | 1 Solarwinds | 1 Web Help Desk | 2024-11-21 | 5.4 Medium |
| SolarWinds Web Help Desk 12.7.0 allows XSS via a CSV template file with a crafted Location Name field. | ||||
| CVE-2019-16958 | 1 Solarwinds | 1 Help Desk | 2024-11-21 | 5.4 Medium |
| Cross-site Scripting (XSS) vulnerability in SolarWinds Web Help Desk 12.7.0 allows attacker to inject arbitrary web script or HTML via Location Name. | ||||