In FusionPBX up to v4.5.7, the file resources\paging.php has a paging function (called by several pages of the interface), which uses an unsanitized "param" variable constructed partially from the URL args and reflected in HTML, leading to XSS.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16983.json"