NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
82265 | CVE-2017-5963 | An issue was discovered in caddy (for TYPO3) before 7.2.10. The vulnerability exists due to insufficient filtration of user-supplied data in the paymillToken HTTP POST parameter passed to the caddy/Resources/Public/JavaScript/e-payment/paymill/api/php/payment.php URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. | 2 | 4.3 | Medium | 2017-03-18 | 2017-03-03 | View | |
82264 | CVE-2017-5962 | An issue was discovered in contexts_wurfl (for TYPO3) before 0.4.2. The vulnerability exists due to insufficient filtration of user-supplied data in the force_ua HTTP GET parameter passed to the /contexts_wurfl/Library/wurfl-dbapi-1.4.4.0/check_wurfl.php URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. | 2 | 4.3 | Medium | 2017-03-18 | 2017-03-03 | View | |
82263 | CVE-2017-5961 | An issue was discovered in ionize through 1.0.8. The vulnerability exists due to insufficient filtration of user-supplied data in the path HTTP GET parameter passed to the ionize-master/themes/admin/javascript/tinymce/jscripts/tiny_mce/plugins/codemirror/dialog.php URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. | 2 | 4.3 | Medium | 2017-03-18 | 2017-03-01 | View | |
82262 | CVE-2017-5960 | An issue was discovered in Phalcon Eye through 0.4.1. The vulnerability exists due to insufficient filtration of user-supplied data in multiple HTTP GET parameters passed to the phalconeye-master/public/external/pydio/plugins/editor.webodf/frame.php URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. | 2 | 4.3 | Medium | 2017-03-18 | 2017-03-01 | View | |
82261 | CVE-2017-5954 | An issue was discovered in the serialize-to-js package 0.5.0 for Node.js. Untrusted data passed into the deserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE). | 2 | 7.5 | High | 2017-03-18 | 2017-03-13 | View |
Page 1220 of 17672, showing 5 records out of 88360 total, starting on record 6096, ending on 6100