Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Alist
(Alist_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 7 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-03-12 | CVE-2022-26533 | Alist v2.1.0 and below was discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. | Alist | 6.1 | ||
2022-12-12 | CVE-2022-45968 | Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one). | Alist | 8.8 | ||
2022-12-12 | CVE-2022-45970 | Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board. | Alist | 5.4 | ||
2022-12-15 | CVE-2022-45969 | Alist v3.4.0 is vulnerable to Directory Traversal, | Alist | 9.8 | ||
2023-05-23 | CVE-2023-31726 | AList 3.15.1 is vulnerable to Incorrect Access Control, which can be exploited by attackers to obtain sensitive information. | Alist | 7.5 | ||
2023-06-07 | CVE-2023-33498 | alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file. | Alist | 8.8 | ||
2024-09-30 | CVE-2024-47067 | AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0. | Alist | 6.1 |