6.1

CVE-2023-1298

ServiceNow has released upgrades and patches that address a Reflected Cross-Site scripting (XSS) vulnerability that was identified in the ServiceNow Polaris Layout. This vulnerability would enable an authenticated user to inject arbitrary scripts.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ServicenowServicenow Versionsan_diego Updatepatch_1
ServicenowServicenow Versionsan_diego Updatepatch_1_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_1_hotfix_1a
ServicenowServicenow Versionsan_diego Updatepatch_1_hotfix_1b
ServicenowServicenow Versionsan_diego Updatepatch_2
ServicenowServicenow Versionsan_diego Updatepatch_2_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_3
ServicenowServicenow Versionsan_diego Updatepatch_3_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_3_hotfix_2
ServicenowServicenow Versionsan_diego Updatepatch_3_hotfix_3
ServicenowServicenow Versionsan_diego Updatepatch_3_hotfix_4
ServicenowServicenow Versionsan_diego Updatepatch_4
ServicenowServicenow Versionsan_diego Updatepatch_4a
ServicenowServicenow Versionsan_diego Updatepatch_4b
ServicenowServicenow Versionsan_diego Updatepatch_5
ServicenowServicenow Versionsan_diego Updatepatch_6
ServicenowServicenow Versionsan_diego Updatepatch_7
ServicenowServicenow Versionsan_diego Updatepatch_7_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_7_hotfix_2
ServicenowServicenow Versionsan_diego Updatepatch_7_hottix_3
ServicenowServicenow Versionsan_diego Updatepatch_7a
ServicenowServicenow Versionsan_diego Updatepatch_7b
ServicenowServicenow Versionsan_diego Updatepatch_8
ServicenowServicenow Versionsan_diego Updatepatch_8_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_8_hotfix_2
ServicenowServicenow Versionsan_diego Updatepatch_9
ServicenowServicenow Versionsan_diego Updatepatch_9a
ServicenowServicenow Versionsan_diego Updatepatch_9a_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_9b
ServicenowServicenow Versiontokyo Update-
ServicenowServicenow Versiontokyo Updatepatch_1
ServicenowServicenow Versiontokyo Updatepatch_1_hotfix_1
ServicenowServicenow Versiontokyo Updatepatch_1a
ServicenowServicenow Versiontokyo Updatepatch_1b
ServicenowServicenow Versiontokyo Updatepatch_2
ServicenowServicenow Versiontokyo Updatepatch_2_hotfix_1
ServicenowServicenow Versiontokyo Updatepatch_2_hotfix_2
ServicenowServicenow Versiontokyo Updatepatch_2_hotfix_3
ServicenowServicenow Versiontokyo Updatepatch_2_hotfix_4
ServicenowServicenow Versiontokyo Updatepatch_3
ServicenowServicenow Versiontokyo Updatepatch_3_hotfix_1
ServicenowServicenow Versiontokyo Updatepatch_3_hotfix_2
ServicenowServicenow Versiontokyo Updatepatch_3_hotfix_3
ServicenowServicenow Versiontokyo Updatepatch_3_hotfix_4
ServicenowServicenow Versiontokyo Updatepatch_4
ServicenowServicenow Versiontokyo Updatepatch_4_hotfix_2
ServicenowServicenow Versiontokyo Updatepatch_4_hotfix_3
ServicenowServicenow Versiontokyo Updatepatch_4a
ServicenowServicenow Versiontokyo Updatepatch_4a_hotfix_1
ServicenowServicenow Versiontokyo Updatepatch_5
ServicenowServicenow Versiontokyo Updatepatch_5_hotfix_1
ServicenowServicenow Versiontokyo Updatepatch_5_hotfix_2
ServicenowServicenow Versiontokyo Updatepatch_5_hotfix_3
ServicenowServicenow Versionutah Updatepatch_1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.92% 0.757
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
psirt@servicenow.com 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.