Cookie Consent by Free Privacy Policy Generator 📌 CVE-2022-48328 | MISP up to 2.4.166 IndexFilterComponent.php ordered_url_params/additional_delimiters exceptional condition


✅ CVE-2022-48328 | MISP up to 2.4.166 IndexFilterComponent.php ordered_url_params/additional_delimiters exceptional condition


💡 Newskategorie: Sicherheitslücken
🔗 Quelle: vuldb.com

A vulnerability classified as problematic was found in MISP up to 2.4.166. Affected by this vulnerability is an unknown functionality of the file app/Controller/Component/IndexFilterComponent.php. The manipulation of the argument ordered_url_params/additional_delimiters leads to handling of exceptional conditions. This vulnerability is known as CVE-2022-48328. The attack can only be done within the local network. There is no exploit available. It is recommended to upgrade the affected component. ...

✅ Medium CVE-2019-12794: MISP MISP


📈 35.32 Punkte

✅ Medium CVE-2019-12868: MISP MISP


📈 35.32 Punkte

✅ Low CVE-2020-10247: MISP MISP


📈 35.32 Punkte

✅ Low CVE-2020-10246: MISP MISP


📈 35.32 Punkte

✅ Low CVE-2020-11458: MISP MISP


📈 35.32 Punkte

✅ Medium CVE-2020-12889: MISP Misp-maltego


📈 35.32 Punkte

✅ Medium CVE-2020-12889: MISP Misp-maltego


📈 35.32 Punkte

✅ Low CVE-2020-13153: MISP MISP


📈 35.32 Punkte

✅ Low CVE-2021-3184: MISP MISP


📈 35.32 Punkte

✅ Low CVE-2021-25325: MISP MISP


📈 35.32 Punkte

✅ Low CVE-2021-25324: MISP MISP


📈 35.32 Punkte

✅ Medium CVE-2021-25323: MISP MISP


📈 35.32 Punkte

✅ MISP 2.4.82 app/webroot/js/misp.js sharingGroupPopulateOrganisations Cross Site Scripting


📈 34.3 Punkte

✅ MISP 2.4.91 app/webroot/js/misp.js Cross Site Scripting


📈 34.3 Punkte

✅ MISP 2.4.82 app/webroot/js/misp.js sharingGroupPopulateOrganisations cross site scripting


📈 34.3 Punkte

✅ Misp-Dashboard - A Dashboard For A Real-Time Overview Of Threat Intelligence From MISP Instances


📈 34.3 Punkte

✅ MISP 2.4.91 app/webroot/js/misp.js cross site scripting


📈 34.3 Punkte

✅ Siemens LOGO! 8 BM exceptional condition [CVE-2020-25236]


📈 28.64 Punkte

✅ CVE-2023-20993 | Google Android 13.0 SnoozeHelper.java exceptional condition (A-261588851)


📈 28.64 Punkte

✅ CVE-2023-45820 | Directus up to 10.6.1 exceptional condition (GHSA-hmgw-9jrg-hf2m)


📈 28.64 Punkte

✅ CVE-2023-38406 | FRRouting FRR up to 8.4.2 bgpd/bgp_flowspec.c exceptional condition


📈 28.64 Punkte

✅ CVE-2023-46673 | Elastic Elasticsearch up to 7.17.13/8.10.2 Simulate Pipeline API exceptional condition


📈 28.64 Punkte

✅ CVE-2023-42559 | Samsung Knox Guard exceptional condition


📈 28.64 Punkte

✅ CVE-2023-25644 | ZTE MC801A/MC801A1 Web Interface exceptional condition


📈 28.64 Punkte

✅ CVE-2023-6866 | Mozilla Firefox up to 120 Typed Array exceptional condition


📈 28.64 Punkte

✅ CVE-2024-21907 | Newtonsoft.Json up to 13.0.0 JsonConvert.DeserializeObject exceptional condition


📈 28.64 Punkte

✅ CVE-2009-5043 | Burn Quotation Mark File Name exceptional condition


📈 28.64 Punkte

✅ CVE-2011-4625 | SimpleSAMLphp up to 1.6.2/1.8.1 XML Encryption exceptional condition (ID 70545)


📈 28.64 Punkte

✅ CVE-2011-2807 | Google Chrome WebKit Timer.cpp exceptional condition (ID 40393)


📈 28.64 Punkte

✅ CVE-2011-2336 | Google Chrome Blink AnimationControllerPrivate exceptional condition (ID 85693)


📈 28.64 Punkte

✅ CVE-2012-1109 | mwlib 0.13.0/0.13.1/0.13.2/0.13.3/0.13.4 exceptional condition (BID-52577 / OSVDB-80084)


📈 28.64 Punkte

✅ CVE-2019-0144 | Intel Ethernet 700 Series Controller up to 6.x exceptional condition


📈 28.64 Punkte

✅ CVE-2019-0143 | Intel Ethernet 700 Series Controller up to 6.x Kernel-Mode Driver exceptional condition


📈 28.64 Punkte











matomo

Datei nicht gefunden!