7 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover. En Factor (App Framework & Headless CMS) versiones v1.0.4 a v1.8.30, invalida inapropiadamente la sesión de un usuario incluso después de que éste cierre la sesión de la aplicación. Además, las sesiones de usuarios se guardan en el almacenamiento local del navegador, que por defecto no presenta un tiempo de caducidad. • https://github.com/FactorJS/factor/blob/v1.8.30/%40factor/user/util.ts#L65 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985 • CWE-613: Insufficient Session Expiration •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.3 to v1.8.30, are vulnerable to stored Cross-Site Scripting (XSS) at the “post reply” section. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. En Factor (App Framework & Headless CMS) forum plugin, versiones v1.3.3 a v1.8.30, son vulnerables a un ataque de tipo Cross-Site Scripting (XSS) almacenado en la sección "post reply". Un atacante no autenticado puede ejecutar código JavaScript malicioso y robar las cookies de sesión • https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-reply.vue#L119 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25984 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. En Factor (App Framework & Headless CMS) forum plugin, versiones v1.3.8 a v1.8.30, son vulnerables a un ataque de tipo Cross-Site Scripting (XSS) reflejado en los parámetros "tags" y "category" de la URL. Un atacante no autenticado puede ejecutar código JavaScript malicioso y robar las cookies de sesión • https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-list.vue#L141-L143 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. En Factor (App Framework & Headless CMS) forum plugin, versiones 1.3.5 a 1.8.30, es vulnerable a un ataque de tipo Cross-Site Scripting (XSS) reflejado en el parámetro "search" de la URL. Un atacante no autenticado puede ejecutar código JavaScript malicioso y robar las cookies de sesión • https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-list.vue#L139 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25982 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 1%CPEs: 198EXPL: 0

A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting. Cierto algoritmo generador de números pseudo-aleatorios(PRNG) que usa XOR y alterna en saltos de 2-bit (también conocido com o"algoritmo X2"), usado en OpenBSD de la v2.6 a la 3.4, Mac OS X de la v10 a a 10.5.1, FreeBSD 4.4 a la 7.0 y DragonFlyBSD 1.0 a la 1.10.1, permite a atacantes remotos adivinar datos sensibles como los IDs de una fragmentación IP observando una secuencia generada previamente. NOTA: este fallo puede ser aprovechado por ataques como la inyección de paquetes TCP y OS fingerprinting. • http://seclists.org/bugtraq/2008/Feb/0052.html http://seclists.org/bugtraq/2008/Feb/0063.html http://secunia.com/advisories/28819 http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10%3Bcontenttype= http://www.securiteam.com/securityreviews/5PP0H0UNGW.html http://www.securityfocus.com/archive/1/487658 http://www.securityfocus.com/bid/27647 http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf https://e •