Page 8 of 94 results (0.011 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

DOM XSS in microweber ver 1.2.15 in GitHub repository microweber/microweber prior to 1.2.16. inject arbitrary js code, deface website, steal cookie... Una vulnerabilidad de tipo DOM XSS en microweber versión 1.2.15 en el repositorio de GitHub microweber/microweber versiones anteriores a 1.2.16. inyectar código js arbitrario, desfigurar el sitio web, robar cookie... • https://github.com/microweber/microweber/commit/724e2d186a33c0c27273107dc4f160a09384877f https://huntr.dev/bounties/d9f9b5bd-16f3-4eaa-9e36-d4958b557687 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 1

XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks. Una vulnerabilidad de tipo XSS en /demo/module/?module=HERE en el repositorio de GitHub microweber/microweber versiones anteriores a 1.2.15. • https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 1

Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction. Una vulnerabilidad de tipo XSS reflejado en demo.microweber.org/demo/module/ en el repositorio de GitHub microweber/microweber versiones anteriores a 1.2.15. Ejecuta JavaScript arbitrario como el usuario atacado. • https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8 https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Able to create an account with long password leads to memory corruption / Integer Overflow in GitHub repository microweber/microweber prior to 1.2.12. La posibilidad de crear una cuenta con una contraseña larga conlleva una corrupción de memoria / Desbordamiento de Búfer, en el repositorio GitHub microweber/microweber versiones anteriores a 1.2.12 • https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a https://huntr.dev/bounties/db615581-d5a9-4ca5-a3e9-7a39eceaa424 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The microweber application allows large characters to insert in the input field "fist & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in microweber/microweber in GitHub repository microweber/microweber prior to 1.2.12. La aplicación microweber permite insertar caracteres grandes en el campo de entrada "fist & last name", lo que puede permitir a atacantes causar una denegación de servicio (DoS) por medio de una petición HTTP diseñada. en microweber/microweber en el repositorio de GitHub microweber/microweber versiones anteriores a 1.2.12 • https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e • CWE-190: Integer Overflow or Wraparound •