Total vulnerabilities in the database
Reflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.
Software | From | Fixed in |
---|---|---|
wso2 / api_manager | 3.1.0 | 3.1.0.x |
wso2 / api_manager | 3.2.0 | 3.2.0.x |
wso2 / identity_server_as_key_manager | 5.10.0 | 5.10.0.x |
wso2 / identity_server | 5.10.0 | 5.10.0.x |