6.1
CVE-2023-1298
- EPSS 0.92%
- Veröffentlicht 06.07.2023 18:15:10
- Zuletzt bearbeitet 17.12.2024 13:58:11
- Quelle psirt@servicenow.com
- CVE-Watchlists
- Unerledigt
ServiceNow has released upgrades and patches that address a Reflected Cross-Site scripting (XSS) vulnerability that was identified in the ServiceNow Polaris Layout. This vulnerability would enable an authenticated user to inject arbitrary scripts.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_1
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_1_hotfix_1
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_1_hotfix_1a
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_1_hotfix_1b
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_2
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_2_hotfix_1
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_3
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_3_hotfix_1
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_3_hotfix_2
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_3_hotfix_3
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_3_hotfix_4
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_4
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_4a
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_4b
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_5
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_6
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_7
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_7_hotfix_1
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_7_hotfix_2
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_7_hottix_3
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_7a
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_7b
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_8
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_8_hotfix_1
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_8_hotfix_2
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_9
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_9a
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_9a_hotfix_1
Servicenow ≫ Servicenow Versionsan_diego Updatepatch_9b
Servicenow ≫ Servicenow Versiontokyo Update-
Servicenow ≫ Servicenow Versiontokyo Updatepatch_1
Servicenow ≫ Servicenow Versiontokyo Updatepatch_1_hotfix_1
Servicenow ≫ Servicenow Versiontokyo Updatepatch_1a
Servicenow ≫ Servicenow Versiontokyo Updatepatch_1b
Servicenow ≫ Servicenow Versiontokyo Updatepatch_2
Servicenow ≫ Servicenow Versiontokyo Updatepatch_2_hotfix_1
Servicenow ≫ Servicenow Versiontokyo Updatepatch_2_hotfix_2
Servicenow ≫ Servicenow Versiontokyo Updatepatch_2_hotfix_3
Servicenow ≫ Servicenow Versiontokyo Updatepatch_2_hotfix_4
Servicenow ≫ Servicenow Versiontokyo Updatepatch_3
Servicenow ≫ Servicenow Versiontokyo Updatepatch_3_hotfix_1
Servicenow ≫ Servicenow Versiontokyo Updatepatch_3_hotfix_2
Servicenow ≫ Servicenow Versiontokyo Updatepatch_3_hotfix_3
Servicenow ≫ Servicenow Versiontokyo Updatepatch_3_hotfix_4
Servicenow ≫ Servicenow Versiontokyo Updatepatch_4
Servicenow ≫ Servicenow Versiontokyo Updatepatch_4_hotfix_2
Servicenow ≫ Servicenow Versiontokyo Updatepatch_4_hotfix_3
Servicenow ≫ Servicenow Versiontokyo Updatepatch_4a
Servicenow ≫ Servicenow Versiontokyo Updatepatch_4a_hotfix_1
Servicenow ≫ Servicenow Versiontokyo Updatepatch_5
Servicenow ≫ Servicenow Versiontokyo Updatepatch_5_hotfix_1
Servicenow ≫ Servicenow Versiontokyo Updatepatch_5_hotfix_2
Servicenow ≫ Servicenow Versiontokyo Updatepatch_5_hotfix_3
Servicenow ≫ Servicenow Versionutah Updatepatch_1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.92% | 0.757 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
| psirt@servicenow.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.