4 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover. En Factor (App Framework & Headless CMS) versiones v1.0.4 a v1.8.30, invalida inapropiadamente la sesión de un usuario incluso después de que éste cierre la sesión de la aplicación. Además, las sesiones de usuarios se guardan en el almacenamiento local del navegador, que por defecto no presenta un tiempo de caducidad. • https://github.com/FactorJS/factor/blob/v1.8.30/%40factor/user/util.ts#L65 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985 • CWE-613: Insufficient Session Expiration •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.3 to v1.8.30, are vulnerable to stored Cross-Site Scripting (XSS) at the “post reply” section. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. En Factor (App Framework & Headless CMS) forum plugin, versiones v1.3.3 a v1.8.30, son vulnerables a un ataque de tipo Cross-Site Scripting (XSS) almacenado en la sección "post reply". Un atacante no autenticado puede ejecutar código JavaScript malicioso y robar las cookies de sesión • https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-reply.vue#L119 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25984 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. En Factor (App Framework & Headless CMS) forum plugin, versiones v1.3.8 a v1.8.30, son vulnerables a un ataque de tipo Cross-Site Scripting (XSS) reflejado en los parámetros "tags" y "category" de la URL. Un atacante no autenticado puede ejecutar código JavaScript malicioso y robar las cookies de sesión • https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-list.vue#L141-L143 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. En Factor (App Framework & Headless CMS) forum plugin, versiones 1.3.5 a 1.8.30, es vulnerable a un ataque de tipo Cross-Site Scripting (XSS) reflejado en el parámetro "search" de la URL. Un atacante no autenticado puede ejecutar código JavaScript malicioso y robar las cookies de sesión • https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-list.vue#L139 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25982 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •