In FusionPBX up to v4.5.7, the file resources\paging.php has a paging function (called by several pages of the interface), which uses an unsanitized "param" variable constructed partially from the URL args and reflected in HTML, leading to XSS.
[ { "events": [ { "introduced": "0" }, { "last_affected": "4.5.7" } ] } ]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16983.json"