Core Security

131 exploits Active since Mar 2003
CVE-2018-17442 EXPLOITDB HIGH text WORKING POC
D-Link Central WiFi Manager <1.03r0100-Beta1 - RCE
An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. An unrestricted file upload vulnerability in the onUploadLogPic endpoint allows remote authenticated users to execute arbitrary PHP code.
CVSS 8.8
CVE-2018-17441 EXPLOITDB MEDIUM text WORKING POC
D-Link Central WiFi Manager <1.03r0100-Beta1 - XSS
An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. The 'username' parameter of the addUser endpoint is vulnerable to stored XSS.
CVSS 6.1
CVE-2018-17440 EXPLOITDB CRITICAL text WORKING POC
D-Link Central WiFi Manager <1.03r0100-Beta1 - RCE
An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. They expose an FTP server that serves by default on port 9000 and has hardcoded credentials (admin, admin). Taking advantage of this, a remote unauthenticated attacker could execute arbitrary PHP code by uploading any file in the web root directory and then accessing it via a request.
CVSS 9.8
CVE-2017-9812 EXPLOITDB HIGH text WORKING POC
Kaspersky Anti-virus For Linux Server < 8.0.3.297 - Information Disclosure
The reportId parameter of the getReportStatus action method can be abused in the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312) to read arbitrary files with kluser privileges.
CVSS 7.5
CVE-2017-9811 EXPLOITDB CRITICAL text WORKING POC
Kaspersky Anti-virus For Linux Server < 8.0.3.297 - Improper Input Validation
The kluser is able to interact with the kav4fs-control binary in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). By abusing the quarantine read and write operations, it is possible to elevate the privileges to root.
CVSS 9.8
CVE-2017-9810 EXPLOITDB HIGH text WORKING POC
Kaspersky Anti-Virus for Linux File Server <8.0.4.312 - CSRF
There are no Anti-CSRF tokens in any forms on the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). This would allow an attacker to submit authenticated requests when an authenticated user browses an attacker-controlled domain.
CVSS 8.8
CVE-2018-6229 EXPLOITDB CRITICAL text WORKING POC
Trendmicro Email Encryption Gateway - SQL Injection
A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 edit policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
CVSS 9.8
CVE-2018-6228 EXPLOITDB CRITICAL text WORKING POC
Trendmicro Email Encryption Gateway - SQL Injection
A SQL injection vulnerability in a Trend Micro Email Encryption Gateway 5.5 policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
CVSS 9.8
CVE-2018-6227 EXPLOITDB MEDIUM text WORKING POC
Trendmicro Email Encryption Gateway - XSS
A stored cross-site scripting (XSS) vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject client-side scripts into vulnerable systems.
CVSS 5.4
CVE-2018-6226 EXPLOITDB MEDIUM text WORKING POC
Trendmicro Email Encryption Gateway - XSS
Reflected cross-site scripting (XSS) vulnerabilities in two Trend Micro Email Encryption Gateway 5.5 configuration files could allow an attacker to inject client-side scripts into vulnerable systems.
CVSS 5.4
CVE-2018-6225 EXPLOITDB MEDIUM text WORKING POC
Trendmicro Email Encryption Gateway - XXE
An XML external entity injection (XXE) vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an authenticated user to expose a normally protected configuration script.
CVSS 4.3
CVE-2018-6224 EXPLOITDB HIGH text WORKING POC
Trendmicro Email Encryption Gateway - CSRF
A lack of cross-site request forgery (CSRF) protection vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to submit authenticated requests to a user browsing an attacker-controlled domain.
CVSS 8.8
CVE-2018-6223 EXPLOITDB CRITICAL text WORKING POC
Trendmicro Email Encryption Gateway - Missing Authentication
A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to manipulate the registration process of the product to reset configuration parameters.
CVSS 9.8
CVE-2018-6222 EXPLOITDB HIGH text WORKING POC
Trendmicro Email Encryption Gateway - OS Command Injection
Arbitrary logs location in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to change location of log files and be manipulated to execute arbitrary commands and attain command execution on a vulnerable system.
CVSS 7.8
CVE-2018-6221 EXPLOITDB HIGH text WORKING POC
Trendmicro Email Encryption Gateway - Improper Certificate Validation
An unvalidated software update vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a man-in-the-middle attacker to tamper with an update file and inject their own.
CVSS 8.1
CVE-2018-6220 EXPLOITDB CRITICAL text WORKING POC
Trendmicro Email Encryption Gateway - Injection
An arbitrary file write vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject arbitrary data, which may lead to gaining code execution on vulnerable systems.
CVSS 9.8
CVE-2018-6219 EXPLOITDB MEDIUM text WORKING POC
Trendmicro Email Encryption Gateway - Improper Certificate Validation
An Insecure Update via HTTP vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to eavesdrop and tamper with certain types of update data.
CVSS 6.5
CVE-2018-1204 EXPLOITDB MEDIUM text WORKING POC
Dell Emc Isilon Onefs < 7.2.1.6 - Path Traversal
Dell EMC Isilon OneFS versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, versions 7.2.1.x, and version 7.1.1.11 is affected by a path traversal vulnerability in the isi_phone_home tool. A malicious compadmin may potentially exploit this vulnerability to execute arbitrary code with root privileges.
CVSS 6.7
CVE-2018-1203 EXPLOITDB MEDIUM text WORKING POC
Dell Emc Isilon Onefs < 8.0.0.6 - Incorrect Permission Assignment
In Dell EMC Isilon OneFS, the compadmin is able to run tcpdump binary with root privileges. In versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, the tcpdump binary, being run with sudo, may potentially be used by compadmin to execute arbitrary code with root privileges.
CVSS 6.7
CVE-2018-1202 EXPLOITDB MEDIUM text WORKING POC
Dell Emc Isilon < 8.0.0.6 - XSS
Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, and version 7.1.1.11 is affected by a cross-site scripting vulnerability in the NDMP Page within the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website.
CVSS 4.8
CVE-2018-1201 EXPLOITDB MEDIUM text WORKING POC
Dell Emc Isilon < 8.0.0.6 - XSS
Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, versions 7.2.1.x, and version 7.1.1.11 is affected by a cross-site scripting vulnerability in the Job Operations Page within the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website.
CVSS 4.8
CVE-2018-1189 EXPLOITDB MEDIUM text WORKING POC
Dell EMC Isilon - XSS
Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, versions 7.2.1.x, and version 7.1.1.11 is affected by a cross-site scripting vulnerability in the Antivirus Page within the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website.
CVSS 4.8
CVE-2018-1188 EXPLOITDB MEDIUM text WORKING POC
Dell EMC Isilon - XSS
Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, and versions 7.2.1.x is affected by a cross-site scripting vulnerability in the Authorization Providers page within the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website.
CVSS 4.8
CVE-2018-1187 EXPLOITDB MEDIUM text WORKING POC
Dell EMC Isilon - XSS
Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6 is affected by a cross-site scripting vulnerability in the Network Configuration page within the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website.
CVSS 4.8
CVE-2018-1186 EXPLOITDB MEDIUM text WORKING POC
Dell EMC Isilon - XSS
Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, versions 7.2.1.x, and version 7.1.1.11 is affected by a cross-site scripting vulnerability in the Cluster description of the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website.
CVSS 4.8