|
223061
|
7.8 |
HIGH
Local
|
avg avast
|
anti-virus antivirus
|
An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\system32\wbemcomn.dll, which is loaded into…
|
CWE-427
Uncontrolled Search Path Element
|
CVE-2019-17093
|
2024-11-21 13:31 |
2019-10-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
223062
|
6.1 |
MEDIUM
Network
|
fusionpbx
|
fusionpbx
|
In FusionPBX up to 4.5.7, the file app\extensions\extension_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.
|
CWE-79
Cross-site Scripting
|
CVE-2019-16977
|
2024-11-21 13:31 |
2019-10-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
223063
|
6.1 |
MEDIUM
Network
|
fusionpbx
|
fusionpbx
|
In FusionPBX up to 4.5.7, the file app\contacts\contact_notes.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.
|
CWE-79
Cross-site Scripting
|
CVE-2019-16975
|
2024-11-21 13:31 |
2019-10-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
223064
|
6.1 |
MEDIUM
Network
|
fusionpbx
|
fusionpbx
|
In FusionPBX up to 4.5.7, the file app\destinations\destination_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.
|
CWE-79
Cross-site Scripting
|
CVE-2019-16976
|
2024-11-21 13:31 |
2019-10-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
223065
|
6.1 |
MEDIUM
Network
|
fusionpbx
|
fusionpbx
|
In FusionPBX up to 4.5.7, the file app\contacts\contact_edit.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.
|
CWE-79
Cross-site Scripting
|
CVE-2019-16973
|
2024-11-21 13:31 |
2019-10-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
223066
|
6.1 |
MEDIUM
Network
|
fusionpbx
|
fusionpbx
|
In FusionPBX up to 4.5.7, the file app\contacts\contact_addresses.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.
|
CWE-79
Cross-site Scripting
|
CVE-2019-16972
|
2024-11-21 13:31 |
2019-10-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
223067
|
6.1 |
MEDIUM
Network
|
fusionpbx
|
fusionpbx
|
In FusionPBX up to 4.5.7, the file app\messages\messages_thread.php uses an unsanitized "contact_uuid" variable coming from the URL, which is reflected on 3 occasions in HTML, leading to XSS.
|
CWE-79
Cross-site Scripting
|
CVE-2019-16971
|
2024-11-21 13:31 |
2019-10-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
223068
|
5.4 |
MEDIUM
Network
|
totemo
|
totemodata
|
totemodata 3.0.0_b936 has XSS via a folder name.
|
CWE-79
Cross-site Scripting
|
CVE-2019-17189
|
2024-11-21 13:31 |
2019-10-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
223069
|
6.1 |
MEDIUM
Network
|
rocket.chat
|
rocket.chat
|
Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line.
|
CWE-79
Cross-site Scripting
|
CVE-2019-17220
|
2024-11-21 13:31 |
2019-10-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
223070
|
6.1 |
MEDIUM
Network
|
fusionpbx
|
fusionpbx
|
In FusionPBX up to 4.5.7, the file app\contacts\contact_times.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.
|
CWE-79
Cross-site Scripting
|
CVE-2019-16974
|
2024-11-21 13:31 |
2019-10-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|