Filtered by vendor Fusionpbx
Subscribe
Total
51 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-23387 | 1 Fusionpbx | 1 Fusionpbx | 2024-01-25 | N/A | 4.8 MEDIUM |
FusionPBX prior to 5.1.0 contains a cross-site scripting vulnerability. If this vulnerability is exploited by a remote authenticated attacker with an administrative privilege, an arbitrary script may be executed on the web browser of the user who is logging in to the product. | |||||
CVE-2021-43405 | 1 Fusionpbx | 1 Fusionpbx | 2023-08-08 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in FusionPBX before 4.5.30. The fax_extension may have risky characters (it is not constrained to be numeric). | |||||
CVE-2021-43404 | 1 Fusionpbx | 1 Fusionpbx | 2023-08-08 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in FusionPBX before 4.5.30. The FAX file name may have risky characters. | |||||
CVE-2022-35153 | 1 Fusionpbx | 1 Fusionpbx | 2023-08-08 | N/A | 9.8 CRITICAL |
FusionPBX 5.0.1 was discovered to contain a command injection vulnerability via /fax/fax_send.php. | |||||
CVE-2022-28055 | 1 Fusionpbx | 1 Fusionpbx | 2023-08-08 | 7.5 HIGH | 9.8 CRITICAL |
Fusionpbx v4.4 and below contains a command injection vulnerability via the download email logs function. | |||||
CVE-2019-16965 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 9.0 HIGH | 7.2 HIGH |
resources/cmd.php in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute any commands on the host as www-data. | |||||
CVE-2019-16968 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered in FusionPBX up to 4.5.7. In the file app\conference_controls\conference_control_details.php, an unsanitized id variable coming from the URL is reflected in HTML on 2 occasions, leading to XSS. | |||||
CVE-2019-16974 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
In FusionPBX up to 4.5.7, the file app\contacts\contact_times.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. | |||||
CVE-2019-16971 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
In FusionPBX up to 4.5.7, the file app\messages\messages_thread.php uses an unsanitized "contact_uuid" variable coming from the URL, which is reflected on 3 occasions in HTML, leading to XSS. | |||||
CVE-2019-16972 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
In FusionPBX up to 4.5.7, the file app\contacts\contact_addresses.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. | |||||
CVE-2019-16973 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
In FusionPBX up to 4.5.7, the file app\contacts\contact_edit.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS. | |||||
CVE-2019-16981 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
In FusionPBX up to v4.5.7, the file app\conference_profiles\conference_profile_params.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS. | |||||
CVE-2019-16990 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.0 MEDIUM | 6.5 MEDIUM |
In FusionPBX up to v4.5.7, the file app/music_on_hold/music_on_hold.php uses an unsanitized "file" variable coming from the URL, which takes any pathname (base64 encoded) and allows a download of it. | |||||
CVE-2019-16980 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 6.5 MEDIUM | 8.8 HIGH |
In FusionPBX up to v4.5.7, the file app\call_broadcast\call_broadcast_edit.php uses an unsanitized "id" variable coming from the URL in an unparameterized SQL query, leading to SQL injection. | |||||
CVE-2019-16979 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
In FusionPBX up to v4.5.7, the file app\contacts\contact_urls.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS. | |||||
CVE-2019-16978 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
In FusionPBX up to v4.5.7, the file app\devices\device_settings.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS. | |||||
CVE-2019-16986 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.0 MEDIUM | 6.5 MEDIUM |
In FusionPBX up to v4.5.7, the file resources\download.php uses an unsanitized "f" variable coming from the URL, which takes any pathname and allows a download of it. (resources\secure_download.php is also affected.) | |||||
CVE-2019-16985 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 8.5 HIGH | 6.5 MEDIUM |
In FusionPBX up to v4.5.7, the file app\xml_cdr\xml_cdr_delete.php uses an unsanitized "rec" variable coming from the URL, which is base64 decoded and allows deletion of any file of the system. | |||||
CVE-2019-16984 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
In FusionPBX up to v4.5.7, the file app\recordings\recording_play.php uses an unsanitized "filename" variable coming from the URL, which is base64 decoded and reflected in HTML, leading to XSS. | |||||
CVE-2019-16983 | 1 Fusionpbx | 1 Fusionpbx | 2023-02-03 | 4.3 MEDIUM | 6.1 MEDIUM |
In FusionPBX up to v4.5.7, the file resources\paging.php has a paging function (called by several pages of the interface), which uses an unsanitized "param" variable constructed partially from the URL args and reflected in HTML, leading to XSS. |