Filtered by vendor Mitre
Subscribe
Total
14 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-41139 | 1 Mitre | 1 Caldera | 2024-11-21 | N/A | 5.4 MEDIUM |
MITRE CALDERA 4.1.0 allows stored XSS via app.contact.gist (aka the gist contact configuration field), leading to execution of arbitrary commands on agents. | |||||
CVE-2022-40606 | 1 Mitre | 1 Caldera | 2024-11-21 | N/A | 6.1 MEDIUM |
MITRE CALDERA before 4.1.0 allows XSS in the Operations tab and/or Debrief plugin via a crafted operation name, a different vulnerability than CVE-2022-40605. | |||||
CVE-2022-40605 | 1 Mitre | 1 Caldera | 2024-11-21 | N/A | 6.1 MEDIUM |
MITRE CALDERA before 4.1.0 allows XSS in the Operations tab and/or Debrief plugin via a crafted operation name, a different vulnerability than CVE-2022-40606. | |||||
CVE-2022-31004 | 1 Mitre | 1 Cve-services | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
CVEProject/cve-services is an open source project used to operate the CVE services API. A conditional in 'data.js' has potential for production secrets to be written to disk. The affected method writes the generated randomKey to disk if the environment is not development. If this method were called in production, it is possible that it would write the plaintext key to disk. A patch is not available as of time of publication but is anticipated as a "hot fix" for version 1.1.1 and for the 2.x branch. | |||||
CVE-2021-46561 | 1 Mitre | 1 Cve Services | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
controller/org.controller/org.controller.js in the CVE Services API 1.1.1 before 5c50baf3bda28133a3bc90b854765a64fb538304 allows an organizational administrator to transfer a user account to an arbitrary new organization, and thereby achieve unintended access within the context of that new organization. | |||||
CVE-2021-42562 | 1 Mitre | 1 Caldera | 2024-11-21 | 5.5 MEDIUM | 8.1 HIGH |
An issue was discovered in CALDERA 2.8.1. It does not properly segregate user privileges, resulting in non-admin users having access to read and modify configuration or other components that should only be accessible by admin users. | |||||
CVE-2021-42561 | 1 Mitre | 1 Caldera | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands. | |||||
CVE-2021-42560 | 1 Mitre | 1 Caldera | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in CALDERA 2.9.0. The Debrief plugin receives base64 encoded "SVG" parameters when generating a PDF document. These SVG documents are parsed in an unsafe manner and can be leveraged for XXE attacks (e.g., File Exfiltration, Server Side Request Forgery, Out of Band Exfiltration, etc.). | |||||
CVE-2021-42559 | 1 Mitre | 1 Caldera | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in CALDERA 2.8.1. It contains multiple startup "requirements" that execute commands when starting the server. Because these commands can be changed via the REST API, an authenticated user can insert arbitrary commands that will execute when the server is restarted. | |||||
CVE-2021-42558 | 1 Mitre | 1 Caldera | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered in CALDERA 2.8.1. It contains multiple reflected, stored, and self XSS vulnerabilities that may be exploited by authenticated and unauthenticated attackers. | |||||
CVE-2020-19907 | 1 Mitre | 1 Caldera | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
A command injection vulnerability in the sandcat plugin of Caldera 2.3.1 and earlier allows authenticated attackers to execute any command or service. | |||||
CVE-2020-14462 | 1 Mitre | 1 Caldera | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
CALDERA 2.7.0 allows XSS via the Operation Name box. | |||||
CVE-2020-10807 | 1 Mitre | 1 Caldera | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
auth_svc in Caldera before 2.6.5 allows authentication bypass (for REST API requests) via a forged "localhost" string in the HTTP Host header. | |||||
CVE-2008-4704 | 1 Mitre | 1 Sezhoo | 2024-11-21 | 10.0 HIGH | N/A |
PHP remote file inclusion vulnerability in SezHooTabsAndActions.php in SezHoo 0.1 allows remote attackers to execute arbitrary PHP code via a URL in the IP parameter. |