Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mfscripts yetishare vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv3
CVE-2019-19732
translation_manage_text.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 up to and including 4.5.3 directly insert values from the aSortDir_0 and/or sSortDir_0 parameter into a SQL string. This allows an malicious user to inject their own SQL and manipulate the...
Mfscripts Yetishare
5.3
CVSSv3
CVE-2019-19805
_account_forgot_password.ajax.php in MFScripts YetiShare 3.5.2 up to and including 4.5.3 takes a different amount of time to return depending on whether an email address is configured for the account name provided. This can be used by an malicious user to enumerate accounts by gu...
Mfscripts Yetishare
5.3
CVSSv3
CVE-2019-19806
_account_forgot_password.ajax.php in MFScripts YetiShare 3.5.2 up to and including 4.5.3 displays a message indicating whether an email address is configured for the account name provided. This can be used by an malicious user to enumerate accounts by guessing email addresses.
Mfscripts Yetishare
8.8
CVSSv3
CVE-2019-20059
payment_manage.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 up to and including 4.5.4 directly insert values from the sSortDir_0 parameter into a SQL string. This allows an malicious user to inject their own SQL and manipulate the query, typically extractin...
Mfscripts Yetishare
7.5
CVSSv3
CVE-2019-20060
MFScripts YetiShare v3.5.2 through v4.5.4 places sensitive information in the Referer header. If this leaks, then third parties may discover password-reset hashes, file-delete links, or other sensitive information.
Mfscripts Yetishare
7.5
CVSSv3
CVE-2019-20061
The user-introduction email in MFScripts YetiShare v3.5.2 through v4.5.4 may leak the (system-picked) password if this email is sent in cleartext. In other words, the user is not allowed to choose their own initial password.
Mfscripts Yetishare
9.8
CVSSv3
CVE-2019-20062
MFScripts YetiShare v3.5.2 through v4.5.4 might allow an malicious user to reset a password by using a leaked hash (the hash never expires until used).
Mfscripts Yetishare
6.1
CVSSv3
CVE-2019-19733
_get_all_file_server_paths.ajax.php (aka get_all_file_server_paths.ajax.php) in MFScripts YetiShare 3.5.2 up to and including 4.5.3 does not sanitize or encode the output from the fileIds parameter on the page, which would allow an malicious user to input HTML or execute scripts ...
Mfscripts Yetishare
8.8
CVSSv3
CVE-2019-19734
_account_move_file_in_folder.ajax.php in MFScripts YetiShare 3.5.2 directly inserts values from the fileIds parameter into a SQL string. This allows an malicious user to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection.
Mfscripts Yetishare
9.1
CVSSv3
CVE-2019-19735
class.userpeer.php in MFScripts YetiShare 3.5.2 up to and including 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an malicious user to guess the hash and set the password within a few hours by bruteforcing.
Mfscripts Yetishare
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »