Show filters
14 Total Results
Displaying 1-10 of 14
Sort by:
Attacker Value
Unknown
CVE-2019-20060
Disclosure Date: February 10, 2020 (last updated February 21, 2025)
MFScripts YetiShare v3.5.2 through v4.5.4 places sensitive information in the Referer header. If this leaks, then third parties may discover password-reset hashes, file-delete links, or other sensitive information.
0
Attacker Value
Unknown
CVE-2019-20062
Disclosure Date: February 10, 2020 (last updated February 21, 2025)
MFScripts YetiShare v3.5.2 through v4.5.4 might allow an attacker to reset a password by using a leaked hash (the hash never expires until used).
0
Attacker Value
Unknown
CVE-2019-20061
Disclosure Date: February 10, 2020 (last updated February 21, 2025)
The user-introduction email in MFScripts YetiShare v3.5.2 through v4.5.4 may leak the (system-picked) password if this email is sent in cleartext. In other words, the user is not allowed to choose their own initial password.
0
Attacker Value
Unknown
CVE-2019-20059
Disclosure Date: February 10, 2020 (last updated February 21, 2025)
payment_manage.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.4 directly insert values from the sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection. NOTE: this issue exists because of an incomplete fix for CVE-2019-19732.
0
Attacker Value
Unknown
CVE-2019-19806
Disclosure Date: December 30, 2019 (last updated November 08, 2023)
_account_forgot_password.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 displays a message indicating whether an email address is configured for the account name provided. This can be used by an attacker to enumerate accounts by guessing email addresses.
0
Attacker Value
Unknown
CVE-2019-19805
Disclosure Date: December 30, 2019 (last updated November 08, 2023)
_account_forgot_password.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 takes a different amount of time to return depending on whether an email address is configured for the account name provided. This can be used by an attacker to enumerate accounts by guessing email addresses.
0
Attacker Value
Unknown
CVE-2019-19735
Disclosure Date: December 30, 2019 (last updated November 08, 2023)
class.userpeer.php in MFScripts YetiShare 3.5.2 through 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an attacker to guess the hash and set the password within a few hours by bruteforcing.
0
Attacker Value
Unknown
CVE-2019-19738
Disclosure Date: December 30, 2019 (last updated November 08, 2023)
log_file_viewer.php in MFScripts YetiShare 3.5.2 through 4.5.3 does not sanitize or encode the output from the lFile parameter on the page, which would allow an attacker to input HTML or execute scripts on the site, aka XSS.
0
Attacker Value
Unknown
CVE-2019-19734
Disclosure Date: December 30, 2019 (last updated November 08, 2023)
_account_move_file_in_folder.ajax.php in MFScripts YetiShare 3.5.2 directly inserts values from the fileIds parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection.
0
Attacker Value
Unknown
CVE-2019-19732
Disclosure Date: December 30, 2019 (last updated November 08, 2023)
translation_manage_text.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 directly insert values from the aSortDir_0 and/or sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection.
0