CVE-2020-4038

CVSS v3 Score
7.4
High
CVSS v2 Score
4.3
Medium

Vulnerability Description

GraphQL Playground (graphql-playground-html NPM package) before version 1.6.22 have a severe XSS Reflection attack vulnerability. All unsanitized user input passed into renderPlaygroundPage() method could trigger this vulnerability. This has been patched in graphql-playground-html version 1.6.22. Note that some of the associated dependent middleware packages are also affected including but not limited to graphql-playground-middleware-express before version 1.7.16, graphql-playground-middleware-koa before version 1.6.15, graphql-playground-middleware-lambda before version 1.7.17, and graphql-playground-middleware-hapi before 1.6.13.

CVSS:7.4(High)

The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cro...

CWE-792016
CVSS:7.4(High)

Reflected XSS in web interface for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an unauthenticated user to potentially enable denial of service via network...

CWE-792019
CVSS:7.4(High)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the address/ URI.

CWE-792019
CVSS:7.4(High)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the addresses/ URI.

CWE-792019
CVSS:7.4(High)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the blog/ URI.

CWE-792019
CVSS:7.4(High)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the contact/ URI.

CWE-792019