CVE-2026-28355
- EPSS 0.05%
- Veröffentlicht 27.02.2026 21:04:13
- Zuletzt bearbeitet 02.03.2026 20:30:10
Canarytokens help track activity and actions on a network. Versions prior to `sha-7ff0e12` have a Self Cross-Site Scripting vulnerability in the "PWA" Canarytoken, whereby the Canarytoken's creator can attack themselves or someone they share the link...
CVE-2024-41664
- EPSS 0.1%
- Veröffentlicht 23.07.2024 17:15:12
- Zuletzt bearbeitet 21.11.2024 09:32:55
Canarytokens help track activity and actions on a network. Prior to `sha-8ea5315`, Canarytokens.org was vulnerable to a blind SSRF in the Webhook alert feature. When a Canarytoken is created, users choose to receive alerts either via email or via a w...
CVE-2024-41663
- EPSS 0.1%
- Veröffentlicht 23.07.2024 16:15:06
- Zuletzt bearbeitet 21.11.2024 09:32:55
Canarytokens help track activity and actions on a network. A Cross-Site Scripting vulnerability was identified in the "Cloned Website" Canarytoken, whereby the Canarytoken's creator can attack themselves. The creator of a slow-redirect Canarytoken c...
CVE-2024-28111
- EPSS 0.58%
- Veröffentlicht 06.03.2024 22:15:57
- Zuletzt bearbeitet 05.12.2025 16:25:22
Canarytokens helps track activity and actions on a network. Canarytokens.org supports exporting the history of a Canarytoken's incidents in CSV format. The generation of these CSV files is vulnerable to a CSV Injection vulnerability. This flaw can be...
CVE-2023-22475
- EPSS 0.43%
- Veröffentlicht 06.01.2023 15:15:09
- Zuletzt bearbeitet 21.11.2024 07:44:52
Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens prior to sha-fb61290. An attacker who discovers an HTTP-base...
CVE-2022-31113
- EPSS 0.24%
- Veröffentlicht 01.07.2022 17:15:07
- Zuletzt bearbeitet 21.11.2024 07:03:55
Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens. This permits an attacker who recognised an HTTP-based Canar...
CVE-2019-9768
- EPSS 33.48%
- Veröffentlicht 14.03.2019 09:29:00
- Zuletzt bearbeitet 21.11.2024 04:52:16
Thinkst Canarytokens through commit hash 4e89ee0 (2019-03-01) relies on limited variation in size, metadata, and timestamp, which makes it easier for attackers to estimate whether a Word document contains a token.