Show filters
57 Total Results
Displaying 41-50 of 57
Sort by:
Attacker Value
Unknown

CVE-2018-12530

Disclosure Date: June 18, 2018 (last updated November 26, 2024)
An issue was discovered in MetInfo 6.0.0. admin/app/batch/csvup.php allows remote attackers to delete arbitrary files via a flienamecsv=../ directory traversal. This can be exploited via CSRF.
0
Attacker Value
Unknown

CVE-2018-12531

Disclosure Date: June 18, 2018 (last updated November 26, 2024)
An issue was discovered in MetInfo 6.0.0. install\index.php allows remote attackers to write arbitrary PHP code into config_db.php, a different vulnerability than CVE-2018-7271.
0
Attacker Value
Unknown

CVE-2018-9985

Disclosure Date: April 10, 2018 (last updated November 26, 2024)
The front page of MetInfo 6.0 allows XSS by sending a feedback message to an administrator.
0
Attacker Value
Unknown

CVE-2018-9934

Disclosure Date: April 10, 2018 (last updated November 26, 2024)
The reset-password feature in MetInfo 6.0 allows remote attackers to change arbitrary passwords via vectors involving a Host HTTP header that is modified to specify a web server under the attacker's control.
0
Attacker Value
Unknown

CVE-2018-9928

Disclosure Date: April 10, 2018 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in save.php in MetInfo 6.0 allows remote attackers to inject arbitrary web script or HTML via the webname or weburl parameter.
0
Attacker Value
Unknown

CVE-2018-7721

Disclosure Date: March 07, 2018 (last updated November 26, 2024)
Cross Site Scripting (XSS) exists in MetInfo 6.0.0 via /feedback/index.php because app/system/feedback/web/feedback.class.php mishandles input data.
0
Attacker Value
Unknown

CVE-2018-7271

Disclosure Date: February 21, 2018 (last updated November 26, 2024)
An issue was discovered in MetInfo 6.0.0. In install/install.php in the installation process, the config/config_db.php configuration file filtering is not rigorous: one can insert malicious code in the installation process to execute arbitrary commands or obtain a web shell.
0
Attacker Value
Unknown

CVE-2017-14513

Disclosure Date: September 17, 2017 (last updated November 26, 2024)
Directory traversal vulnerability in MetInfo 5.3.17 allows remote attackers to read information from any ini format file via the f_filename parameter in a fingerprintdo action to admin/app/physical/physical.php.
0
Attacker Value
Unknown

CVE-2017-11715

Disclosure Date: July 28, 2017 (last updated November 26, 2024)
job/uploadfile_save.php in MetInfo through 5.3.17 blocks the .php extension but not related extensions, which might allow remote authenticated admins to execute arbitrary PHP code by uploading a .phtml file after certain actions involving admin/system/safe.php and job/cv.php.
0
Attacker Value
Unknown

CVE-2017-11717

Disclosure Date: July 28, 2017 (last updated November 26, 2024)
MetInfo through 5.3.17 accepts the same CAPTCHA response for 120 seconds, which makes it easier for remote attackers to bypass intended challenge requirements by modifying the client-server data stream, as demonstrated by the login/findpass page.
0