Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown

CVE-2018-16473

Disclosure Date: November 06, 2018 (last updated November 27, 2024)
A path traversal in takeapeek module versions <=0.2.2 allows an attacker to list directory and files.
0
Attacker Value
Unknown

The MAC address/device tracking ID of an iTrack Easy can be obtained within ran…

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
The iTrack device tracking ID number, also called "LosserID" in the web API, can be obtained by being in the range of an iTrack device. The tracker ID is the device's BLE MAC address.
0
Attacker Value
Unknown

iTrack Easy does not use session cookies to maintain sessions and POSTs the use…

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Session cookies are not used for maintaining valid sessions in iTrack Easy. The user's password is passed as a POST parameter over HTTPS using a base64 encoded passwd field on every request. In this implementation, sessions can only be terminated when the user changes the associated password.
0
Attacker Value
Unknown

iTrack Easy mobile application stores the user password in base-64 encoding/cle…

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
The iTrack Easy mobile application stores the account password used to authenticate to the cloud API in base64-encoding in the cache.db file. The base64 encoding format is considered equivalent to cleartext.
0
Attacker Value
Unknown

CVE-2015-8373

Disclosure Date: December 22, 2015 (last updated November 25, 2024)
The kea-dhcp4 and kea-dhcp6 servers 0.9.2 and 1.0.0-beta in ISC Kea, when certain debugging settings are used, allow remote attackers to cause a denial of service (daemon crash) via a malformed packet.
0
Attacker Value
Unknown

CVE-2006-6255

Disclosure Date: December 04, 2006 (last updated October 04, 2023)
Direct static code injection vulnerability in util.php in the NukeAI 0.0.3 Beta module for PHP-Nuke, aka Program E is an AIML chatterbot, allows remote attackers to upload and execute arbitrary PHP code via a filename with a .php extension in the filename parameter and code in the moreinfo parameter, which is saved to a filename under descriptions/, which is accessible via a direct request.
0
Attacker Value
Unknown

CVE-2006-6202

Disclosure Date: December 01, 2006 (last updated October 04, 2023)
PHP remote file inclusion vulnerability in modules/NukeAI/util.php in the NukeAI 0.0.3 Beta module for PHP-Nuke, aka Program E is an AIML chatterbot, allows remote attackers to execute arbitrary PHP code via a URL in the AIbasedir parameter.
0