CWE:
 

Topic
Date
Author
Med.
WordPress lbg_zoominoutslider Plugins 5.0.3 File Information Exposure
14.01.2019
KingSkrupellos
Med.
WordPress lbg-audio5-html5-shoutcast_sticky 4.9.x File Information Exposure
14.01.2019
KingSkrupellos
Med.
WordPress all_in_one_bannerWithPlaylist Plugins 5.0.3 File Information Exposure
14.01.2019
KingSkrupellos
Med.
WordPress all_in_one_bannerRotator Plugins 4.9.9 File Information Exposure
14.01.2019
KingSkrupellos
Med.
WordPress lbg-audio8-html5-radio_ads Plugins 4.9.x File Information Exposure
14.01.2019
KingSkrupellos
Med.
Sophos UTM 9 Management Appplication Local File Inclusion
25.10.2017
Matt Bergin
Low
SPIP 3.1.2 File Enumeration / Path Traversal
20.10.2016
Nicolas CHATELAIN


CVEMAP Search Results

CVE
Details
Description
2019-01-07
Low
CVE-2018-11798

Updating...
 

 
The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.

 
2018-09-12
Low
CVE-2018-16970

Vendor: Wisetail
Software: Learning man...
 

 
Wisetail Learning Ecosystem (LE) through v4.11.6 allows insecure direct object reference (IDOR) attacks to download non-purchased course files via a modified id parameter.

 
2018-06-11
Low
CVE-2017-5387

Vendor: Mozilla
Software: Firefox
 

 
The existence of a specifically requested local file can be found due to the double firing of the "onerror" when the "source" attribute on a "<track>" tag refers to a file that does not exist if the source page is loaded locally. This vulnerability affects Firefox < 51.

 
2018-05-15
Medium
CVE-2018-10590

Vendor: Advantech
Software: Webaccess
 

 
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an information exposure vulnerability through directory listing has been identified, which may allow an attacker to find important files that are not normally visible.

 

 


Copyright 2019, cxsecurity.com

 

Back to Top