Page 2 of 8 results (0.001 seconds)

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 1

The Canto plugin 1.3.0 for WordPress contains blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/get.php?subdomain=SSRF. El plugin Canto versión 1.3.0 para WordPress, contiene una vulnerabilidad de tipo SSRF ciega. Permite a un atacante no autenticado poder realizar una petición a cualquier servidor interno y externo por medio de /includes/lib/get.php? • https://www.exploit-db.com/exploits/49189 http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html https://gist.github.com/p4nk4jv/87aebd999ce4b28063943480e95fd9e0 https://github.com/CantoDAM/Canto-Wordpress-Plugin https://wordpress.org/plugins/canto/#developers https://www.canto.com/integrations/wordpress • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 1

The Canto plugin 1.3.0 for WordPress contains blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/tree.php?subdomain=SSRF. El plugin Canto versión 1.3.0 para WordPress, contiene una vulnerabilidad de tipo SSRF ciega. Permite a un atacante no autenticado poder realizar una petición a cualquier servidor interno y externo por medio de /includes/lib/tree.php? • https://www.exploit-db.com/exploits/49189 http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html https://gist.github.com/p4nk4jv/87aebd999ce4b28063943480e95fd9e0 https://github.com/CantoDAM/Canto-Wordpress-Plugin https://wordpress.org/plugins/canto/#developers https://www.canto.com/integrations/wordpress • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 3

canto_curses/guibase.py in Canto Curses before 0.9.0 allows remote feed servers to execute arbitrary commands via shell metacharacters in a URL in a feed. canto_curses/guibase.py en Canto Curses anterior a 0.9.0 permite a servidores de alimentación remotos ejecutar comandos arbitrarios a través de metacaracteres de shell en una URL en una alimentación. • http://seclists.org/oss-sec/2014/q4/826 http://seclists.org/oss-sec/2014/q4/832 http://www.securityfocus.com/bid/71323 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731582 https://exchange.xforce.ibmcloud.com/vulnerabilities/98947 https://github.com/themoken/canto-curses/commit/2817869f98c54975f31e2dd674c1aefa70749cca • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •