Users login

Create an account »

JOIN XATRIX

Users login

Home » CVE vulnerabilities

CVE Vulnerabilities

CVE vulnerabilities is a database of publicly known information security vulnerabilities and exposures.
Page: 123456 out of 2784

CVE-2017-6807 | March 13, 2017
mod_auth_mellon before 0.13.1 is vulnerable to a Cross-Site Session Transfer attack, where a user with access to one web site running on a server can copy their session cookie to a different web site on the same server to get access to that site.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-6180 | March 13, 2017
Keekoon KK002 devices 1.8.12 HD have a Cross Site Request Forgery Vulnerability affecting goform/formChnUserPwd and goform/formUserMng (and the entire set of other pages).
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-6081 | March 13, 2017
A CSRF issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1. To exploit the vulnerability, an attacker can send cross-domain requests directly to the REST API for users with a valid session cookie.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-6080 | March 13, 2017
An issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, caused by lack of a protection mechanism involving HTTP Access-Control headers. To exploit the vulnerability, an attacker can send cross-domain requests directly to the REST API for users with a valid session cookie and receive the result.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-5929 | March 13, 2017
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.
Severity: High | Impact score: 6.40 | Exploit score: 10.00
Vendors affected: Logback

CVE-2017-5675 | March 13, 2017
A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-5674 | March 13, 2017
A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-5621 | March 13, 2017
An issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1. XSS can be triggered via malicious HTML in a chat message or the content of a ticket article, when using either the REST API or the WebSocket API.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-5620 | March 13, 2017
An XSS issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1. Attachments are opened in a new tab instead of getting downloaded. This creates an attack vector of executing code in the domain of the application.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-5619 | March 13, 2017
An issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1. Attackers can login with the hashed password itself (e.g., from the DB) instead of the valid password string.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-6823 | March 12, 2017
Fiyo CMS 2.0.6.1 allows remote authenticated users to gain privileges via a modified level parameter to dapur/ in an app=user&act=edit action.
Severity: Medium | Impact score: 6.40 | Exploit score: 8.00
Vendors affected: Fiyo

CVE-2017-6820 | March 12, 2017
rcube_utils.php in Roundcube before 1.1.8 and 1.2.x before 1.2.4 is susceptible to a cross-site scripting vulnerability via a crafted Cascading Style Sheets (CSS) token sequence within an SVG element.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-6444 | March 12, 2017
The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-5626 | March 12, 2017
OxygenOS before version 4.0.2, on OnePlus 3 and 3T, has two hidden fastboot oem commands (4F500301 and 4F500302) that allow the attacker to lock/unlock the bootloader, disregarding the 'OEM Unlocking' checkbox, without user confirmation and without a factory reset. This allows for persistent code execution with high privileges (kernel/root) with complete access to user data.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-5624 | March 12, 2017
An issue was discovered in OxygenOS before 4.0.3 for OnePlus 3 and 3T. The attacker can persistently make the (locked) bootloader start the platform with dm-verity disabled, by issuing the 'fastboot oem disable_dm_verity' command. Having dm-verity disabled, the kernel will not verify the system partition (and any other dm-verity protected partition), which may allow for persistent code execution and privilege escalation.
Severity: | Impact score: 0.00 | Exploit score: 0.00

CVE-2017-6819 | March 11, 2017
In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.
Severity: Medium | Impact score: 2.90 | Exploit score: 8.60
Vendors affected: Wordpress

CVE-2017-6818 | March 11, 2017
In WordPress before 4.7.3 (wp-admin/js/tags-box.js), there is cross-site scripting (XSS) via taxonomy term names.
Severity: Medium | Impact score: 2.90 | Exploit score: 8.60
Vendors affected: Wordpress

CVE-2017-6817 | March 11, 2017
In WordPress before 4.7.3 (wp-includes/embed.php), there is authenticated Cross-Site Scripting (XSS) in YouTube URL Embeds.
Severity: Low | Impact score: 2.90 | Exploit score: 6.80
Vendors affected: Wordpress

CVE-2017-6816 | March 11, 2017
In WordPress before 4.7.3 (wp-admin/plugins.php), unintended files can be deleted by administrators using the plugin deletion functionality.
Severity: Medium | Impact score: 2.90 | Exploit score: 8.00
Vendors affected: Wordpress

CVE-2017-6815 | March 11, 2017
In WordPress before 4.7.3 (wp-includes/pluggable.php), control characters can trick redirect URL validation.
Severity: Medium | Impact score: 4.90 | Exploit score: 8.60
Vendors affected: Wordpress

CVE-2017-6814 | March 11, 2017
In WordPress before 4.7.3, there is authenticated Cross-Site Scripting (XSS) via Media File Metadata. This is demonstrated by both (1) mishandling of the playlist shortcode in the wp_playlist_shortcode function in wp-includes/media.php and (2) mishandling of meta information in the renderTracks function in wp-includes/js/mediaelement/wp-playlist.js.
Severity: Low | Impact score: 2.90 | Exploit score: 6.80
Vendors affected: Wordpress

CVE-2017-6812 | March 11, 2017
paintballrefjosh/MaNGOSWebV4 4.0.8 is vulnerable to a reflected XSS in inc/admin/template_files/admin.vote.php (id parameter).
Severity: Medium | Impact score: 2.90 | Exploit score: 8.60
Vendors affected: Mangoswebv4_project

CVE-2017-6811 | March 11, 2017
paintballrefjosh/MaNGOSWebV4 4.0.8 is vulnerable to a reflected XSS in inc/admin/template_files/admin.shop.php (id parameter).
Severity: Medium | Impact score: 2.90 | Exploit score: 8.60
Vendors affected: Mangoswebv4_project

CVE-2017-6810 | March 11, 2017
paintballrefjosh/MaNGOSWebV4 4.0.8 is vulnerable to a reflected XSS in inc/admin/template_files/admin.fplinks.php (linkid parameter).
Severity: Medium | Impact score: 2.90 | Exploit score: 8.60
Vendors affected: Mangoswebv4_project

CVE-2017-6809 | March 11, 2017
paintballrefjosh/MaNGOSWebV4 4.0.8 is vulnerable to a reflected XSS in inc/admin/template_files/admin.donate.php (id parameter).
Severity: Medium | Impact score: 2.90 | Exploit score: 8.60
Vendors affected: Mangoswebv4_project

Page: 123456 out of 2784

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »