Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mfscripts vulnerabilities and exploits
(subscribe to this query)
9.1
CVSSv3
CVE-2019-19735
class.userpeer.php in MFScripts YetiShare 3.5.2 up to and including 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an malicious user to guess the hash and set the password within a few hours by bruteforcing.
Mfscripts Yetishare
8.8
CVSSv3
CVE-2019-19737
MFScripts YetiShare 3.5.2 up to and including 4.5.3 does not set the SameSite flag on session cookies, allowing the cookie to be sent in cross-site requests and potentially be used in cross-site request forgery attacks.
Mfscripts Yetishare
6.1
CVSSv3
CVE-2019-19738
log_file_viewer.php in MFScripts YetiShare 3.5.2 up to and including 4.5.3 does not sanitize or encode the output from the lFile parameter on the page, which would allow an malicious user to input HTML or execute scripts on the site, aka XSS.
Mfscripts Yetishare
7.5
CVSSv3
CVE-2019-20060
MFScripts YetiShare v3.5.2 through v4.5.4 places sensitive information in the Referer header. If this leaks, then third parties may discover password-reset hashes, file-delete links, or other sensitive information.
Mfscripts Yetishare
7.5
CVSSv3
CVE-2019-20061
The user-introduction email in MFScripts YetiShare v3.5.2 through v4.5.4 may leak the (system-picked) password if this email is sent in cleartext. In other words, the user is not allowed to choose their own initial password.
Mfscripts Yetishare
9.8
CVSSv3
CVE-2019-20062
MFScripts YetiShare v3.5.2 through v4.5.4 might allow an malicious user to reset a password by using a leaked hash (the hash never expires until used).
Mfscripts Yetishare
7.2
CVSSv3
CVE-2019-19732
translation_manage_text.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 up to and including 4.5.3 directly insert values from the aSortDir_0 and/or sSortDir_0 parameter into a SQL string. This allows an malicious user to inject their own SQL and manipulate the...
Mfscripts Yetishare
8.8
CVSSv3
CVE-2019-19734
_account_move_file_in_folder.ajax.php in MFScripts YetiShare 3.5.2 directly inserts values from the fileIds parameter into a SQL string. This allows an malicious user to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection.
Mfscripts Yetishare
6.1
CVSSv3
CVE-2019-19736
MFScripts YetiShare 3.5.2 up to and including 4.5.3 does not set the HttpOnly flag on session cookies, allowing the cookie to be read by script, which can potentially be used by malicious users to obtain the cookie via cross-site scripting.
Mfscripts Yetishare
7.5
CVSSv3
CVE-2019-19739
MFScripts YetiShare 3.5.2 up to and including 4.5.3 does not set the Secure flag on session cookies, allowing the cookie to be sent over cleartext channels.
Mfscripts Yetishare
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5274
CVE-2024-35388
CVE-2024-35396
elevation of privilege
CVE-2021-47544
file upload
CVE-2021-47545
memory leak
CVE-2024-4956
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »