Логотип exploitDog
bind:CVE-2022-39181
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-39181

Количество 4

Количество 4

nvd логотип

CVE-2022-39181

больше 2 лет назад

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.

CVSS3: 6.1
EPSS: Низкий
redos логотип

ROS-20240729-03

11 месяцев назад

Уязвимость glpi-plugin-reports

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-g5m7-qg56-63gq

больше 2 лет назад

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2024-05822

больше 2 лет назад

Уязвимость плагина отчетов системы работы с заявками и инцидентами GLPI reports, связанная c неправильной нейтрализацией входных данных во время генерации веб-страницы, используемых в команде SQL, позволяющая нарушителю провести XSS-атаки

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-39181

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20240729-03

Уязвимость glpi-plugin-reports

CVSS3: 6.1
0%
Низкий
11 месяцев назад
github логотип
GHSA-g5m7-qg56-63gq

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2024-05822

Уязвимость плагина отчетов системы работы с заявками и инцидентами GLPI reports, связанная c неправильной нейтрализацией входных данных во время генерации веб-страницы, используемых в команде SQL, позволяющая нарушителю провести XSS-атаки

CVSS3: 6.1
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу