Show filters
51 Total Results
Displaying 41-50 of 51
Sort by:
Attacker Value
Unknown
CVE-2019-16989
Disclosure Date: October 21, 2019 (last updated November 27, 2024)
In FusionPBX up to v4.5.7, the file app\conferences_active\conference_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.
0
Attacker Value
Unknown
CVE-2019-16986
Disclosure Date: October 21, 2019 (last updated November 27, 2024)
In FusionPBX up to v4.5.7, the file resources\download.php uses an unsanitized "f" variable coming from the URL, which takes any pathname and allows a download of it. (resources\secure_download.php is also affected.)
0
Attacker Value
Unknown
CVE-2019-16979
Disclosure Date: October 21, 2019 (last updated November 27, 2024)
In FusionPBX up to v4.5.7, the file app\contacts\contact_urls.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.
0
Attacker Value
Unknown
CVE-2019-16980
Disclosure Date: October 21, 2019 (last updated November 27, 2024)
In FusionPBX up to v4.5.7, the file app\call_broadcast\call_broadcast_edit.php uses an unsanitized "id" variable coming from the URL in an unparameterized SQL query, leading to SQL injection.
0
Attacker Value
Unknown
CVE-2019-16990
Disclosure Date: October 21, 2019 (last updated November 27, 2024)
In FusionPBX up to v4.5.7, the file app/music_on_hold/music_on_hold.php uses an unsanitized "file" variable coming from the URL, which takes any pathname (base64 encoded) and allows a download of it.
0
Attacker Value
Unknown
CVE-2019-16978
Disclosure Date: October 21, 2019 (last updated November 27, 2024)
In FusionPBX up to v4.5.7, the file app\devices\device_settings.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.
0
Attacker Value
Unknown
CVE-2019-15029
Disclosure Date: September 05, 2019 (last updated November 27, 2024)
FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command.
0
Attacker Value
Unknown
CVE-2019-11409
Disclosure Date: June 17, 2019 (last updated November 27, 2024)
app/operator_panel/exec.php in the Operator Panel module in FusionPBX 4.4.3 suffers from a command injection vulnerability due to a lack of input validation that allows authenticated non-administrative attackers to execute commands on the host. This can further lead to remote code execution when combined with an XSS vulnerability also present in the FusionPBX Operator Panel module.
0
Attacker Value
Unknown
CVE-2019-11410
Disclosure Date: June 17, 2019 (last updated November 27, 2024)
app/backup/index.php in the Backup Module in FusionPBX 4.4.3 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute commands on the host.
0
Attacker Value
Unknown
CVE-2019-11408
Disclosure Date: June 17, 2019 (last updated November 27, 2024)
XSS in app/operator_panel/index_inc.php in the Operator Panel module in FusionPBX 4.4.3 allows remote unauthenticated attackers to inject arbitrary JavaScript characters by placing a phone call using a specially crafted caller ID number. This can further lead to remote code execution by chaining this vulnerability with a command injection vulnerability also present in FusionPBX.
0