5 results (0.037 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in open-falcon dashboard version 0.2.0, allows remote attackers to gain, modify, and delete sensitive information via crafted POST request to register interface. • https://github.com/open-falcon/dashboard/issues/153 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.5 is able to address this issue. • https://github.com/zenoss/ZenPacks.zenoss.Dashboard/commit/f462285a0a2d7e1a9255b0820240b94a43b00a44 https://github.com/zenoss/ZenPacks.zenoss.Dashboard/pull/130 https://github.com/zenoss/ZenPacks.zenoss.Dashboard/releases/tag/1.3.5 https://vuldb.com/?ctiid.217153 https://vuldb.com/?id.217153 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The Dashboard plugin through 1.0.2 for GLPI allows remote low-privileged users to bypass access control on viewing information about the last ten events, the connected users, and the users in the tech category. For example, plugins/dashboard/front/main2.php can be used. El plugin Dashboard versiones hasta 1.0.2 para GLPI, permite a usuarios remotos poco privilegiados omitir un control de acceso en visualizar información sobre los últimos diez eventos, los usuarios conectados y los usuarios en la categoría de tecnología. Por ejemplo, puede ser usado un archivo plugins/dashboard/front/main2.php • https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/dashboard-plugin https://plugins.glpi-project.org/#/plugin/dashboard • CWE-425: Direct Request ('Forced Browsing') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Western Digital Dashboard before 3.2.2.9 allows DLL Hijacking that leads to compromise of the SYSTEM account. Western Digital Dashboard versiones anteriores a 3.2.2.9, permite el secuestro de una DLL que lleva a comprometer la cuenta SYSTEM • https://www.westerndigital.com/support/productsecurity/wdc-20011-western-digital-dashboard-privilege-escalation • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.5EPSS: 92%CPEs: 1EXPL: 1

Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster. Las versiones de Kubernetes Dashboard anteriores a la 1.10.1 permitían a los atacantes omitir la autenticación y usar la cuenta de servicio del dashboard para leer secretos dentro del clúster. • http://www.securityfocus.com/bid/106493 https://github.com/kubernetes/dashboard/pull/3289 https://github.com/kubernetes/dashboard/pull/3400 https://github.com/kubernetes/dashboard/releases/tag/v1.10.1 https://groups.google.com/forum/#%21topic/kubernetes-announce/yBrFf5nmvfI https://sysdig.com/blog/privilege-escalation-kubernetes-dashboard • CWE-306: Missing Authentication for Critical Function •