Search CVE reports
271 – 280 of 37447 results
SPIP before 4.4.9 allows Stored Cross-Site Scripting (XSS) via syndicated sites in the private area. The #URL_SYNDIC output is not properly sanitized on the private syndicated site page, allowing an attacker who can set...
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |
SPIP before 4.4.9 allows Blind Server-Side Request Forgery (SSRF) via syndicated sites in the private area. When editing a syndicated site, the application does not verify that the syndication URL is a valid remote URL, allowing...
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |
A flaw was found in QEMU. A specially crafted VMDK image could trigger an out-of-bounds read vulnerability, potentially leading to a 12-byte leak of sensitive information or a denial of service condition (DoS).
1 affected package
qemu
| Package | 20.04 LTS |
|---|---|
| qemu | Needs evaluation |
SPIP before 4.4.8 contains a stored cross-site scripting (XSS) vulnerability in the public area triggered in certain edge-case usage patterns. The echapper_html_suspect() function does not adequately sanitize user-controlled...
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |
SPIP before 4.4.8 allows cross-site scripting (XSS) in the private area via malicious iframe tags. The application does not properly sandbox or escape iframe content in the back-office, allowing an attacker to inject and execute...
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |
Echo is a Go web framework. In versions 5.0.0 through 5.0.2 on Windows, Echo’s `middleware.Static` using the default filesystem allows path traversal via backslashes, enabling unauthenticated remote file read outside the static...
3 affected packages
golang-github-labstack-echo, golang-github-labstack-echo.v2, golang-github-labstack-echo.v3
| Package | 20.04 LTS |
|---|---|
| golang-github-labstack-echo | — |
| golang-github-labstack-echo.v2 | Not affected |
| golang-github-labstack-echo.v3 | Not affected |
SPIP before 4.4.5 and 4.3.9 allows an Open Redirect via the login form when used in AJAX mode. An attacker can craft a malicious URL that, when visited by a victim, redirects them to an arbitrary external site after login....
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |
SPIP before 4.3.6, 4.2.17, and 4.1.20 allows unauthorized content disclosure in the private area. The application does not properly check authorization when displaying content of articles and sections (rubriques) in AJAX-loaded...
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |
SPIP before 4.3.6, 4.2.17, and 4.1.20 allows Cross-Site Scripting (XSS) in the private area. The content of the error message displayed by the 'transmettre' API is not properly sanitized, allowing an attacker to inject malicious...
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |
SPIP before 4.2.15 allows Cross-Site Scripting (XSS) via crafted content in HTML code tags. The application does not properly verify JavaScript within code tags, allowing an attacker to inject malicious scripts that execute in a...
1 affected package
spip
| Package | 20.04 LTS |
|---|---|
| spip | Needs evaluation |