CVE-2021-27523
https://notcve.org/view.php?id=CVE-2021-27523
An issue was discovered in open-falcon dashboard version 0.2.0, allows remote attackers to gain, modify, and delete sensitive information via crafted POST request to register interface. • https://github.com/open-falcon/dashboard/issues/153 •
CVE-2018-25063 – Zenoss Dashboard defaultportlets.js cross site scripting
https://notcve.org/view.php?id=CVE-2018-25063
A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.5 is able to address this issue. • https://github.com/zenoss/ZenPacks.zenoss.Dashboard/commit/f462285a0a2d7e1a9255b0820240b94a43b00a44 https://github.com/zenoss/ZenPacks.zenoss.Dashboard/pull/130 https://github.com/zenoss/ZenPacks.zenoss.Dashboard/releases/tag/1.3.5 https://vuldb.com/?ctiid.217153 https://vuldb.com/?id.217153 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-30144
https://notcve.org/view.php?id=CVE-2021-30144
The Dashboard plugin through 1.0.2 for GLPI allows remote low-privileged users to bypass access control on viewing information about the last ten events, the connected users, and the users in the tech category. For example, plugins/dashboard/front/main2.php can be used. El plugin Dashboard versiones hasta 1.0.2 para GLPI, permite a usuarios remotos poco privilegiados omitir un control de acceso en visualizar información sobre los últimos diez eventos, los usuarios conectados y los usuarios en la categoría de tecnología. Por ejemplo, puede ser usado un archivo plugins/dashboard/front/main2.php • https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/dashboard-plugin https://plugins.glpi-project.org/#/plugin/dashboard • CWE-425: Direct Request ('Forced Browsing') •
CVE-2020-29654
https://notcve.org/view.php?id=CVE-2020-29654
Western Digital Dashboard before 3.2.2.9 allows DLL Hijacking that leads to compromise of the SYSTEM account. Western Digital Dashboard versiones anteriores a 3.2.2.9, permite el secuestro de una DLL que lleva a comprometer la cuenta SYSTEM • https://www.westerndigital.com/support/productsecurity/wdc-20011-western-digital-dashboard-privilege-escalation • CWE-427: Uncontrolled Search Path Element •
CVE-2018-18264
https://notcve.org/view.php?id=CVE-2018-18264
Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster. Las versiones de Kubernetes Dashboard anteriores a la 1.10.1 permitían a los atacantes omitir la autenticación y usar la cuenta de servicio del dashboard para leer secretos dentro del clúster. • http://www.securityfocus.com/bid/106493 https://github.com/kubernetes/dashboard/pull/3289 https://github.com/kubernetes/dashboard/pull/3400 https://github.com/kubernetes/dashboard/releases/tag/v1.10.1 https://groups.google.com/forum/#%21topic/kubernetes-announce/yBrFf5nmvfI https://sysdig.com/blog/privilege-escalation-kubernetes-dashboard • CWE-306: Missing Authentication for Critical Function •