Show filters
57 Total Results
Displaying 41-50 of 57
Sort by:
Attacker Value
Unknown
CVE-2018-12530
Disclosure Date: June 18, 2018 (last updated November 26, 2024)
An issue was discovered in MetInfo 6.0.0. admin/app/batch/csvup.php allows remote attackers to delete arbitrary files via a flienamecsv=../ directory traversal. This can be exploited via CSRF.
0
Attacker Value
Unknown
CVE-2018-12531
Disclosure Date: June 18, 2018 (last updated November 26, 2024)
An issue was discovered in MetInfo 6.0.0. install\index.php allows remote attackers to write arbitrary PHP code into config_db.php, a different vulnerability than CVE-2018-7271.
0
Attacker Value
Unknown
CVE-2018-9985
Disclosure Date: April 10, 2018 (last updated November 26, 2024)
The front page of MetInfo 6.0 allows XSS by sending a feedback message to an administrator.
0
Attacker Value
Unknown
CVE-2018-9934
Disclosure Date: April 10, 2018 (last updated November 26, 2024)
The reset-password feature in MetInfo 6.0 allows remote attackers to change arbitrary passwords via vectors involving a Host HTTP header that is modified to specify a web server under the attacker's control.
0
Attacker Value
Unknown
CVE-2018-9928
Disclosure Date: April 10, 2018 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in save.php in MetInfo 6.0 allows remote attackers to inject arbitrary web script or HTML via the webname or weburl parameter.
0
Attacker Value
Unknown
CVE-2018-7721
Disclosure Date: March 07, 2018 (last updated November 26, 2024)
Cross Site Scripting (XSS) exists in MetInfo 6.0.0 via /feedback/index.php because app/system/feedback/web/feedback.class.php mishandles input data.
0
Attacker Value
Unknown
CVE-2018-7271
Disclosure Date: February 21, 2018 (last updated November 26, 2024)
An issue was discovered in MetInfo 6.0.0. In install/install.php in the installation process, the config/config_db.php configuration file filtering is not rigorous: one can insert malicious code in the installation process to execute arbitrary commands or obtain a web shell.
0
Attacker Value
Unknown
CVE-2017-14513
Disclosure Date: September 17, 2017 (last updated November 26, 2024)
Directory traversal vulnerability in MetInfo 5.3.17 allows remote attackers to read information from any ini format file via the f_filename parameter in a fingerprintdo action to admin/app/physical/physical.php.
0
Attacker Value
Unknown
CVE-2017-11715
Disclosure Date: July 28, 2017 (last updated November 26, 2024)
job/uploadfile_save.php in MetInfo through 5.3.17 blocks the .php extension but not related extensions, which might allow remote authenticated admins to execute arbitrary PHP code by uploading a .phtml file after certain actions involving admin/system/safe.php and job/cv.php.
0
Attacker Value
Unknown
CVE-2017-11717
Disclosure Date: July 28, 2017 (last updated November 26, 2024)
MetInfo through 5.3.17 accepts the same CAPTCHA response for 120 seconds, which makes it easier for remote attackers to bypass intended challenge requirements by modifying the client-server data stream, as demonstrated by the login/findpass page.
0