Page 2 of 12 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Jellyfin up to v10.7.7 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /Repositories. This vulnerability allows attackers to access network resources and sensitive information via a crafted POST request. • http://jellyfin.com https://gist.github.com/b33t1e/5c067e0538a0b712dc3d59bd4b9a5952 https://github.com/jellyfin/jellyfin https://notes.sjtu.edu.cn/s/yJ9lPk09a • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 2

In Jellyfin 10.8.x through 10.8.3, the name of a playlist is vulnerable to stored XSS. This allows an attacker to steal access tokens from the localStorage of the victim. • https://github.com/jellyfin/jellyfin-web/issues/3788 https://herolab.usd.de/security-advisories https://herolab.usd.de/security-advisories/usd-2022-0030 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

In Jellyfin 10.8.x through 10.8.3, the name of a collection is vulnerable to stored XSS. This allows an attacker to steal access tokens from the localStorage of the victim. • https://github.com/jellyfin/jellyfin-web/issues/3788 https://herolab.usd.de/security-advisories https://herolab.usd.de/security-advisories/usd-2022-0031 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality. En Jellyfin versiones anteriores a 10.8, el endpoint /users presenta un control de acceso incorrecto para la funcionalidad de administrador. • https://docs.google.com/document/d/1cBXQrokCvWxKET4BKi3ZLtVp5gst6-MrGPgMKpfXw8Y/edit https://github.com/jellyfin/jellyfin/pull/7569/files https://medium.com/stolabs/cve-2022-35909-cve-2022-35910-incorrect-access-control-and-xss-stored-to-jellyfin-967359c91058 •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 2

In Jellyfin before 10.8, stored XSS allows theft of an admin access token. En Jellyfin versiones anteriores a 10.8, un ataque de tipo XSS almacenado permite el robo de un token de acceso de administrador. • https://docs.google.com/document/d/1cBXQrokCvWxKET4BKi3ZLtVp5gst6-MrGPgMKpfXw8Y/edit https://github.com/jellyfin/jellyfin/pull/7569/files https://medium.com/stolabs/cve-2022-35909-cve-2022-35910-incorrect-access-control-and-xss-stored-to-jellyfin-967359c91058 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •