Show filters
54 Total Results
Displaying 11-20 of 54
Sort by:
Attacker Value
Unknown

CVE-2022-29273

Disclosure Date: February 22, 2023 (last updated October 08, 2023)
pfSense CE through 2.6.0 and pfSense Plus before 22.05 allow XSS in the WebGUI via URL Table Alias URL parameters.
Attacker Value
Unknown

CVE-2020-21219

Disclosure Date: December 15, 2022 (last updated October 08, 2023)
Cross Site Scripting (XSS) vulnerability in Netgate pf Sense 2.4.4-Release-p3 and Netgate ACME package 0.6.3 allows remote attackers to to run arbitrary code via the RootFolder field to acme_certificate_edit.php page of the ACME package.
Attacker Value
Unknown

CVE-2022-26019

Disclosure Date: March 31, 2022 (last updated October 07, 2023)
Improper access control vulnerability in pfSense CE and pfSense Plus (pfSense CE software versions prior to 2.6.0 and pfSense Plus software versions prior to 22.01) allows a remote attacker with the privilege to change NTP GPS settings to rewrite existing files on the file system, which may result in arbitrary command execution.
Attacker Value
Unknown

CVE-2022-24299

Disclosure Date: March 31, 2022 (last updated October 07, 2023)
Improper input validation vulnerability in pfSense CE and pfSense Plus (pfSense CE software versions prior to 2.6.0 and pfSense Plus software versions prior to 22.01) allows a remote attacker with the privilege to change OpenVPN client or server settings to execute an arbitrary command.
Attacker Value
Unknown

CVE-2021-20729

Disclosure Date: March 31, 2022 (last updated October 07, 2023)
Cross-site scripting vulnerability in pfSense CE and pfSense Plus (pfSense CE software versions 2.5.2 and earlier, and pfSense Plus software versions 21.05 and earlier) allows a remote attacker to inject an arbitrary script via a malicious URL.
Attacker Value
Unknown

CVE-2020-19201

Disclosure Date: July 12, 2021 (last updated February 23, 2025)
A Stored Cross-Site Scripting (XSS) vulnerability was found in status_filter_reload.php, a page in the pfSense software WebGUI, on Netgate pfSense version 2.4.4-p2 and earlier. The page did not encode output from the filter reload process, and a stored XSS was possible via the descr (description) parameter on NAT rules.
Attacker Value
Unknown

CVE-2020-19203

Disclosure Date: July 12, 2021 (last updated February 23, 2025)
An authenticated Cross-Site Scripting (XSS) vulnerability was found in widgets/widgets/wake_on_lan_widget.php, a component of the pfSense software WebGUI, on version 2.4.4-p2 and earlier. The widget did not encode the descr (description) parameter of wake-on-LAN entries in its output, leading to a possible stored XSS.
Attacker Value
Unknown

CVE-2020-10797

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
An XSS vulnerability resides in the hostname field of the diag_ping.php page in pfsense before 2.4.5 version. After passing inputs to the command and executing this command, the $result variable is not sanitized before it is printed.
Attacker Value
Unknown

CVE-2020-11457

Disclosure Date: April 01, 2020 (last updated February 21, 2025)
pfSense before 2.4.5 has stored XSS in system_usermanager_addprivs.php in the WebGUI via the descr parameter (aka full name) of a user.
Attacker Value
Unknown

CVE-2019-16667

Disclosure Date: September 26, 2019 (last updated November 27, 2024)
diag_command.php in pfSense 2.4.4-p3 allows CSRF via the txtCommand or txtRecallBuffer field, as demonstrated by executing OS commands. This occurs because csrf_callback() produces a "CSRF token expired" error and a Try Again button when a CSRF token is missing.