Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
enghouse web chat 6.1.300.31 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2019-16951
A remote file include (RFI) issue exists in Enghouse Web Chat 6.2.284.34. One can replace the localhost attribute with one's own domain name. When the product calls this domain after the POST request is sent, it retrieves an attacker's data and displays it. Also worth m...
Enghouse Web Chat 6.1.300.31
Enghouse Web Chat 6.2.284.34
356
VMScore
CVE-2019-16949
An issue exists in Enghouse Web Chat 6.1.300.31 and 6.2.284.34. A user is allowed to send an archive of their chat log to an email address specified at the beginning of the chat (where the user enters in their name and e-mail address). This POST request can be modified to change ...
Enghouse Web Chat 6.1.300.31
Enghouse Web Chat 6.2.284.34
383
VMScore
CVE-2019-16950
An XSS issue exists in Enghouse Web Chat 6.1.300.31 and 6.2.284.34. The QueueName parameter of a GET request allows for insertion of user-supplied JavaScript.
Enghouse Web Chat 6.1.300.31
Enghouse Web Chat 6.2.284.34
668
VMScore
CVE-2019-16948
An SSRF issue exists in Enghouse Web Chat 6.1.300.31. In any POST request, one can replace the port number at WebServiceLocation=http://localhost:8085/UCWebServices/ with a range of ports to determine what is visible on the internal network (as opposed to what general web traffic...
Enghouse Web Chat 6.1.300.31
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started