User Controllable JavaScript Event (XSS)
- Risk:
Informational
- Type:
- Passive
- CWE:
- CWE-20
- Summary
This check looks at user-supplied input in query string parameters and POST data to identify where certain HTML attribute values might be controlled. This provides hot-spot detection for XSS (cross-site scripting) that will require further review by a security analyst to determine exploitability.
- Solution
Validate all input and sanitize output it before writing to any Javascript on* events.
- Other info
- User-controlled javascript event(s) was found. Exploitability will need to be manually determined. The page at the following URL: http://example.com/i.php?place=moon&name=Foo includes the following Javascript event which may be attacker-controllable: User-input was found in the following data of an [onerror] event: foo The user input was: foo
Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation
Critical WSUS flaw in Windows Server now exploited in attacks
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
Mozilla: New Firefox extensions must disclose data collection practices
Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently
3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation
Windows Server emergency patches fix WSUS bug with PoC exploit
CVE-2025-61884 Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability
CVE-2025-33073 Microsoft Windows SMB Client Improper Access Control Vulnerability
CVE-2022-48503 Apple Multiple Products Unspecified Vulnerability
CVE-2025-54253 Adobe Experience Manager Forms Code Execution Vulnerability
CVE-2016-7836 SKYSEA Client View Improper Authentication Vulnerability
CVE-2025-6264 Rapid7 Velociraptor Incorrect Default Permissions Vulnerability
CVE-2025-59230 Microsoft Windows Improper Access Control Vulnerability
InformationalModern Web Application
InformationalSec-Fetch-Dest Header Has an Invalid Value
MediumBackup File Disclosure
MediumBuffer Overflow
InformationalSplit Viewstate in Use
InformationalContent Security Policy (CSP) Report-Only Header Found
MediumDirectory Browsing
Free online web security scanner