Page 2 of 9 results (0.038 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, was found in Rebuild up to 3.2.3. This affects an unknown part of the file /files/list-file. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/getrebuild/rebuild/issues/598 https://vuldb.com/?ctiid.223743 https://vuldb.com/?id.223743 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, has been found in Rebuild up to 3.2.3. Affected by this issue is some unknown functionality of the file /project/tasks/list. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/getrebuild/rebuild/issues/597 https://vuldb.com/?ctiid.223742 https://vuldb.com/?id.223742 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical was found in Rebuild up to 3.2.3. Affected by this vulnerability is the function queryListOfConfig of the file /admin/robot/approval/list. The manipulation of the argument q leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/getrebuild/rebuild/commit/c9474f84e5f376dd2ade2078e3039961a9425da7 https://github.com/getrebuild/rebuild/issues/594 https://vuldb.com/?ctiid.223381 https://vuldb.com/?id.223381 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A Server-Side Request Forgery (SSRF) in Rebuild v2.8.3 allows attackers to obtain the real IP address and scan Intranet information via the fileurl parameter. Una vulnerabilidad de tipo Server-Side Request Forgery (SSRF) en Rebuild versión v2.8.3, permite a atacantes obtener la dirección IP real y explorar la información de la Intranet por medio del parámetro fileurl • https://github.com/getrebuild/rebuild/issues/460 • CWE-918: Server-Side Request Forgery (SSRF) •