CVE-2019-16983
- EPSS 0.33%
- Veröffentlicht 21.10.2019 16:15:17
- Zuletzt bearbeitet 21.11.2024 04:31:28
In FusionPBX up to v4.5.7, the file resources\paging.php has a paging function (called by several pages of the interface), which uses an unsanitized "param" variable constructed partially from the URL args and reflected in HTML, leading to XSS.
CVE-2019-16982
- EPSS 0.33%
- Veröffentlicht 21.10.2019 16:15:17
- Zuletzt bearbeitet 21.11.2024 04:31:28
In FusionPBX up to v4.5.7, the file app\access_controls\access_control_nodes.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.
CVE-2019-16981
- EPSS 0.33%
- Veröffentlicht 21.10.2019 16:15:17
- Zuletzt bearbeitet 21.11.2024 04:31:28
In FusionPBX up to v4.5.7, the file app\conference_profiles\conference_profile_params.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.
CVE-2019-16990
- EPSS 0.41%
- Veröffentlicht 21.10.2019 15:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:29
In FusionPBX up to v4.5.7, the file app/music_on_hold/music_on_hold.php uses an unsanitized "file" variable coming from the URL, which takes any pathname (base64 encoded) and allows a download of it.
CVE-2019-16980
- EPSS 0.29%
- Veröffentlicht 21.10.2019 15:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:28
In FusionPBX up to v4.5.7, the file app\call_broadcast\call_broadcast_edit.php uses an unsanitized "id" variable coming from the URL in an unparameterized SQL query, leading to SQL injection.
CVE-2019-16979
- EPSS 0.33%
- Veröffentlicht 21.10.2019 15:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:28
In FusionPBX up to v4.5.7, the file app\contacts\contact_urls.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.
CVE-2019-16978
- EPSS 0.33%
- Veröffentlicht 21.10.2019 15:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:27
In FusionPBX up to v4.5.7, the file app\devices\device_settings.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.
- EPSS 21.12%
- Veröffentlicht 05.09.2019 21:15:31
- Zuletzt bearbeitet 21.11.2024 04:27:54
FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services...
- EPSS 6.27%
- Veröffentlicht 17.06.2019 19:15:11
- Zuletzt bearbeitet 21.11.2024 04:21:03
app/backup/index.php in the Backup Module in FusionPBX 4.4.3 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute commands on the host.
CVE-2019-11409
- EPSS 84.67%
- Veröffentlicht 17.06.2019 19:15:11
- Zuletzt bearbeitet 21.11.2024 04:21:03
app/operator_panel/exec.php in the Operator Panel module in FusionPBX 4.4.3 suffers from a command injection vulnerability due to a lack of input validation that allows authenticated non-administrative attackers to execute commands on the host. This ...