CVE-2023-24026
- EPSS 0.34%
- Veröffentlicht 20.01.2023 22:15:10
- Zuletzt bearbeitet 02.04.2025 17:15:36
In MISP 2.4.167, app/webroot/js/event-graph.js has an XSS vulnerability via an event-graph preview payload.
CVE-2023-24028
- EPSS 0.36%
- Veröffentlicht 20.01.2023 22:15:10
- Zuletzt bearbeitet 03.04.2025 15:15:47
In MISP 2.4.167, app/Controller/Component/ACLComponent.php has incorrect access control for the decaying import function.
CVE-2018-11245
- EPSS 0.24%
- Veröffentlicht 18.05.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:42:59
app/webroot/js/misp.js in MISP 2.4.91 has a DOM based XSS with cortex type attributes.
CVE-2018-8948
- EPSS 0.24%
- Veröffentlicht 23.03.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 04:14:40
In MISP before 2.4.89, app/View/Events/resolved_attributes.ctp has multiple XSS issues via a malicious MISP module.
CVE-2018-8949
- EPSS 0.19%
- Veröffentlicht 23.03.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 04:14:40
An issue was discovered in app/Model/Attribute.php in MISP before 2.4.89. There is a critical API integrity bug, potentially allowing users to delete attributes of other events. A crafted edit for an event (without attribute UUIDs but attribute IDs s...
CVE-2017-16802
- EPSS 0.19%
- Veröffentlicht 13.11.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In the sharingGroupPopulateOrganisations function in app/webroot/js/misp.js in MISP 2.4.82, there is XSS via a crafted organisation name that is manually added.
CVE-2017-15216
- EPSS 0.27%
- Veröffentlicht 10.10.2017 18:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
MISP before 2.4.81 has a potential reflected XSS in a quickDelete action that is used to delete a sighting, related to app/View/Sightings/ajax/quickDeleteConfirmationForm.ctp and app/webroot/js/misp.js.
CVE-2017-14337
- EPSS 0.62%
- Veröffentlicht 12.09.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
When MISP before 2.4.80 is configured with X.509 certificate authentication (CertAuth) in conjunction with a non-MISP external user management ReST API, if an external user provides X.509 certificate authentication and this API returns an empty value...