Show filters
96 Total Results
Displaying 81-90 of 96
Sort by:
Attacker Value
Unknown
CVE-2018-19908
Disclosure Date: December 06, 2018 (last updated November 27, 2024)
An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import.
0
Attacker Value
Unknown
CVE-2018-12649
Disclosure Date: June 22, 2018 (last updated November 26, 2024)
An issue was discovered in app/Controller/UsersController.php in MISP 2.4.92. An adversary can bypass the brute-force protection by using a PUT HTTP method instead of a POST HTTP method in the login part, because this protection was only covering POST requests.
0
Attacker Value
Unknown
CVE-2018-11562
Disclosure Date: May 30, 2018 (last updated November 26, 2024)
An issue was discovered in MISP 2.4.91. A vulnerability in app/View/Elements/eventattribute.ctp allows reflected XSS if a user clicks on a malicious link for an event view and then clicks on the deleted attributes quick filter.
0
Attacker Value
Unknown
CVE-2018-11245
Disclosure Date: May 18, 2018 (last updated November 26, 2024)
app/webroot/js/misp.js in MISP 2.4.91 has a DOM based XSS with cortex type attributes.
0
Attacker Value
Unknown
CVE-2018-8949
Disclosure Date: March 23, 2018 (last updated November 26, 2024)
An issue was discovered in app/Model/Attribute.php in MISP before 2.4.89. There is a critical API integrity bug, potentially allowing users to delete attributes of other events. A crafted edit for an event (without attribute UUIDs but attribute IDs set) could overwrite an existing attribute.
0
Attacker Value
Unknown
CVE-2018-8948
Disclosure Date: March 23, 2018 (last updated November 26, 2024)
In MISP before 2.4.89, app/View/Events/resolved_attributes.ctp has multiple XSS issues via a malicious MISP module.
0
Attacker Value
Unknown
CVE-2018-6926
Disclosure Date: February 12, 2018 (last updated November 26, 2024)
In app/Controller/ServersController.php in MISP 2.4.87, a server setting permitted the override of a path variable on certain Red Hed Enterprise Linux and CentOS systems (where rh_shell_fix was enabled), and consequently allowed site admins to inject arbitrary OS commands. The impact is limited by the setting being only accessible to the site administrator.
0
Attacker Value
Unknown
CVE-2017-16946
Disclosure Date: November 25, 2017 (last updated November 26, 2024)
The admin_edit function in app/Controller/UsersController.php in MISP 2.4.82 mishandles the enable_password field, which allows admins to discover a hashed password by reading the audit log.
0
Attacker Value
Unknown
CVE-2017-16802
Disclosure Date: November 13, 2017 (last updated November 26, 2024)
In the sharingGroupPopulateOrganisations function in app/webroot/js/misp.js in MISP 2.4.82, there is XSS via a crafted organisation name that is manually added.
0
Attacker Value
Unknown
CVE-2017-15216
Disclosure Date: October 10, 2017 (last updated November 26, 2024)
MISP before 2.4.81 has a potential reflected XSS in a quickDelete action that is used to delete a sighting, related to app/View/Sightings/ajax/quickDeleteConfirmationForm.ctp and app/webroot/js/misp.js.
0