Versions of keystone prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS) due to unsanitized user input on the Contact Us page, allowing attackers to execute arbitrary JavaScript in the browser
Reporter | Title | Published | Views | Family All 16 |
---|---|---|---|---|
![]() | KeystoneJS 4.0.0-beta.5 - Cross-Site Scripting | 25 Oct 201700:00 | – | exploitdb |
![]() | Cross-Site Scripting in keystone | 15 Nov 201719:44 | – | github |
![]() | Cross site scripting | 24 Oct 201721:29 | – | prion |
![]() | Cross site scripting | 24 Oct 201722:29 | – | prion |
![]() | Cross-site Scripting (XSS) | 25 Oct 201701:55 | – | veracode |
![]() | KeystoneJS 4.0.0-beta.5 - Cross-Site Scripting | 25 Oct 201700:00 | – | exploitpack |
![]() | CVE-2017-15878 | 24 Oct 201721:29 | – | nvd |
![]() | CVE-2017-15881 | 24 Oct 201722:29 | – | nvd |
![]() | KeystoneJS 4.0.0-beta.5 Unauthenticated Stored Cross Site Scripting Vulnerability | 25 Oct 201700:00 | – | zdt |
![]() | CVE-2017-15878 | 24 Oct 201721:29 | – | cve |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo