CVE-2019-17139
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Javascript in the HTML2PDF plugin. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8692.
Published:
October 25, 2019; 03:15:13 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.8 MEDIUM
|
CVE-2019-17138
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.909. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion from JPEG to EPS. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8809.
Published:
October 25, 2019; 03:15:13 PM -04:00
|
V3.1: 4.3 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2019-5129
|
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getSpiritsFromVideo.php is vulnerable to a command injection attack.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2019-5128
|
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImageMP4.php is vulnerable to a command injection attack.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2019-5127
|
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImage.php is vulnerable to a command injection attack.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2019-5123
|
Specially crafted web requests can cause SQL injections in YouPHPTube 7.6. An attacker can send a web request with Parameter dir in /objects/pluginSwitch.json.php.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.5 MEDIUM
|
CVE-2019-5122
|
SQL injection vulnerabilities exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with Parameter name in /objects/pluginSwitch.json.php.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.5 MEDIUM
|
CVE-2019-5121
|
SQL injection vulnerabilities exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with Parameter uuid in /objects/pluginSwitch.json.php
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.5 MEDIUM
|
CVE-2019-5120
|
An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.5 MEDIUM
|
CVE-2019-5119
|
An exploitable SQL injection vulnerability exist in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.5 MEDIUM
|
CVE-2019-5117
|
Exploitable SQL injection vulnerabilities exists in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.5 MEDIUM
|
CVE-2019-5116
|
An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause a SQL injection. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.5 MEDIUM
|
CVE-2019-5114
|
An exploitable SQL injection vulnerability exists in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and,in certain configuration, access the underlying operating system.
Published:
October 25, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.5 MEDIUM
|
CVE-2013-4857
|
D-Link DIR-865L has PHP File Inclusion in the router xml file.
Published:
October 25, 2019; 12:15:10 PM -04:00
|
V3.1: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2019-18418
|
clonos.php in ClonOS WEB control panel 19.09 allows remote attackers to gain full access via change password requests because there is no session management.
Published:
October 24, 2019; 04:15:11 PM -04:00
|
V3.1: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2019-18419
|
A cross-site scripting (XSS) vulnerability in index.php in ClonOS WEB control panel 19.09 allows remote attackers to inject arbitrary web script or HTML via the lang parameter.
Published:
October 24, 2019; 03:15:10 PM -04:00
|
V3.1: 6.1 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2019-18417
|
Sourcecodester Restaurant Management System 1.0 allows an authenticated attacker to upload arbitrary files that can result in code execution. The issue occurs because the application fails to adequately sanitize user-supplied input, e.g., "add a new food" allows .php files.
Published:
October 24, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.5 MEDIUM
|
CVE-2019-18416
|
Sourcecodester Restaurant Management System 1.0 allows XSS via the Last Name field of a member.
Published:
October 24, 2019; 02:15:11 PM -04:00
|
V3.1: 6.1 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2019-18415
|
Sourcecodester Restaurant Management System 1.0 allows XSS via the "send a message" screen.
Published:
October 24, 2019; 02:15:11 PM -04:00
|
V3.1: 6.1 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2019-18414
|
Sourcecodester Restaurant Management System 1.0 is affected by an admin/staff-exec.php Cross Site Request Forgery vulnerability due to a lack of CSRF protection. This could lead to an attacker tricking the administrator into executing arbitrary code or adding a staff entry via a crafted HTML page.
Published:
October 24, 2019; 02:15:11 PM -04:00
|
V3.1: 8.8 HIGH
V2: 6.8 MEDIUM
|