WAFPlanet

CVE Database - 2017

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

4807
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2013-6465

MEDIUM
5.40 CVSS 3.0

Multiple cross-site scripting (XSS) vulnerabilities in JBPM KIE Workbench 6.0.x allow remote authenticated users to inject arbitrary web script or HTML via vectors related to task name html inputs.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-15049

HIGH
8.80 CVSS 3.1

The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.

OS Command Injection
WAF: High

CVE-2017-17758

HIGH
8.80 CVSS 3.0

TP-Link TL-WVR and TL-WAR devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the interface field of an admin/dhcps command to cgi-bin/luci, related to the zone_get_iface_bydev function in /usr/lib/lua/luci/controller/admin/dhcps.lua in uhttpd.

OS Command Injection
WAF: High

CVE-2017-17757

HIGH
8.80 CVSS 3.0

TP-Link TL-WVR and TL-WAR devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the interface field of an admin/wportal command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/wportal.lua in uhttpd.

OS Command Injection
WAF: High

CVE-2017-17105

CRITICAL
9.80 CVSS 3.0

Zivif PR115-204-P-RS V2.3.4.2103 and V4.7.4.2121 (and possibly in-between versions) web cameras are vulnerable to unauthenticated, blind remote command injection via CGI scripts used as part of the web interface, as demonstrated by a cgi-bin/iptest.cgi?cmd=iptest.cgi&-time="1504225666237"&-url=$(reboot) request.

OS Command Injection
WAF: High

CVE-2017-16949

CRITICAL
9.80 CVSS 3.0

An issue was discovered in the AccessKeys AccessPress Anonymous Post Pro plugin through 3.1.9 for WordPress. Improper input sanitization allows the attacker to override the settings for allowed file extensions and upload file size, related to inc/cores/file-uploader.php and file-uploader/file-uploader-class.php. This allows the attacker to upload anything they want to the server, as demonstrated by an action=ap_file_upload_action&allowedExtensions[]=php request to /wp-admin/admin-ajax.php that results in a .php file upload and resultant PHP code execution.

Unrestricted File Upload
WAF: Medium

CVE-2017-15876

HIGH
7.20 CVSS 3.0

Unrestricted File Upload vulnerability in GPWeb 8.4.61 allows remote authenticated users to upload any type of file, including a PHP shell.

Unrestricted File Upload
WAF: Medium

CVE-2017-15875

CRITICAL
9.80 CVSS 3.0

SQL injection vulnerability in Password Recovery in GPWeb 8.4.61 allows remote attackers to execute arbitrary SQL commands via the "checkemail" parameter.

SQL Injection
WAF: High

CVE-2017-15103

HIGH
8.80 CVSS 3.0

A security-check flaw was found in the way the Heketi 5 server API handled user requests. An authenticated Heketi user could send specially crafted requests to the Heketi server, resulting in remote command execution as the user running Heketi server and possibly privilege escalation.

OS Command Injection Improper Input Validation
WAF: High

CVE-2017-17721

CRITICAL
9.80 CVSS 3.0

CWEBNET/WOSummary/List in ZUUSE BEIMS ContractorWeb .NET 5.18.0.0 allows SQL injection via the tradestatus, assetno, assignto, building, domain, jobtype, site, trade, woType, workorderno, or workorderstatus parameter.

SQL Injection
WAF: High

CVE-2017-14583

MEDIUM
6.50 CVSS 3.0

NetApp Clustered Data ONTAP versions 9.x prior to 9.1P10 and 9.2P2 are susceptible to a vulnerability which allows an attacker to cause a Denial of Service (DoS) in SMB environments.

Improper Input Validation
WAF: Medium

CVE-2017-12630

MEDIUM
5.40 CVSS 3.0

In Apache Drill 1.11.0 and earlier when submitting form from Query page users are able to pass arbitrary script or HTML which will take effect on Profile page afterwards. Example: after submitting special script that returns cookie information from Query page, malicious user may obtain this information from Profile page afterwards.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17651

CRITICAL
9.80 CVSS 3.0

Paid To Read Script 2.0.5 has SQL Injection via the admin/userview.php uid parameter, the admin/viewemcamp.php fnum parameter, or the admin/viewvisitcamp.php fn parameter.

SQL Injection
WAF: High

CVE-2017-17649

MEDIUM
6.10 CVSS 3.0

Readymade Video Sharing Script 3.2 has HTML Injection via the single-video-detail.php comment parameter.

Code Injection
WAF: Medium

CVE-2017-17645

CRITICAL
9.80 CVSS 3.0

Bus Booking Script 1.0 has SQL Injection via the txtname parameter to admin/index.php.

SQL Injection
WAF: High

CVE-2017-17643

CRITICAL
9.80 CVSS 3.1

FS Lynda Clone 1.0 has SQL Injection via the keywords parameter to tutorial/.

SQL Injection
WAF: High

CVE-2017-17739

CRITICAL
9.80 CVSS 3.0

The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has directory traversal via the /storage.html rp parameter, allowing an attacker to read or write to files.

Path Traversal
WAF: High

CVE-2017-17737

MEDIUM
6.10 CVSS 3.0

The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has XSS via the REF parameter to /network_diagnostics.html or /storage_info.html.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17731

CRITICAL
9.80 CVSS 3.0

DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.

SQL Injection
WAF: High

CVE-2017-17730

CRITICAL
9.80 CVSS 3.0

DedeCMS through 5.7 has SQL Injection via the logo parameter to plus/flink_add.php.

SQL Injection
WAF: High

CVE-2017-17727

HIGH
8.80 CVSS 3.0

DedeCMS through 5.6 allows arbitrary file upload and PHP code execution by embedding the PHP code in a .jpg file, which is used in the templet parameter to member/article_edit.php.

Unrestricted File Upload
WAF: Medium

CVE-2017-16950

MEDIUM
6.10 CVSS 3.0

Cross - site scripting (XSS) vulnerability in UrBackup Server before 2.1.20 allows remote attackers to inject arbitrary web script or HTML via the action parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17714

MEDIUM
6.10 CVSS 3.0

Trape before 2017-11-05 has XSS via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, the /register lat parameter, the /register lon parameter, the /register org parameter, the /register query parameter, the /register region parameter, the /register regionName parameter, the /register timezone parameter, the /register vId parameter, the /register zip parameter, or the /tping id parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17713

CRITICAL
9.80 CVSS 3.0

Trape before 2017-11-05 has SQL injection via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, the /register lat parameter, the /register lon parameter, the /register org parameter, the /register query parameter, the /register region parameter, the /register regionName parameter, the /register timezone parameter, the /register vId parameter, the /register zip parameter, or the /tping id parameter.

SQL Injection
WAF: High

CVE-2017-17715

HIGH
8.80 CVSS 3.0

The saveFile method in MediaController.java in the Telegram Messenger application before 2017-12-08 for Android allows directory traversal via a pathname obtained in a file-transfer request from a remote peer, as demonstrated by writing to tgnet.dat or tgnet.dat.bak.

Path Traversal
WAF: High

CVE-2017-14134

MEDIUM
6.10 CVSS 3.0

A Reflected XSS Vulnerability affects the forgotten password page of Maplesoft Maple T.A. 2016.0.6 (Customer Hosted) via the emailAddress parameter to passwordreset/PasswordReset.do, aka Open Bug Bounty ID OBB-286688.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-3191

CRITICAL
9.80 CVSS 3.0

D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 are vulnerable to authentication bypass of the remote login page. A remote attacker that can access the remote management login page can manipulate the POST request in such a manner as to access some administrator-only pages such as tools_admin.asp without credentials.

Improper Input Validation
WAF: Medium

CVE-2017-14093

MEDIUM
6.10 CVSS 3.0

The Log Query and Quarantine Query pages in Trend Micro ScanMail for Exchange 12.0 are vulnerable to cross site scripting (XSS) attacks.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-14092

HIGH
8.80 CVSS 3.0

The absence of Anti-CSRF tokens in Trend Micro ScanMail for Exchange 12.0 web interface forms could allow an attacker to submit authenticated requests when an authenticated user browses an attacker-controlled domain.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2017-10904

CRITICAL
9.80 CVSS 3.0

Qt for Android prior to 5.9.0 allows remote attackers to execute arbitrary OS commands via unspecified vectors.

OS Command Injection
WAF: High

CVE-2017-17698

MEDIUM
6.10 CVSS 3.0

Zoho ManageEngine Password Manager Pro 9 before 9.4 (9400) has reflected XSS in SearchResult.ec and BulkAccessControlView.ec.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-16788

HIGH
7.20 CVSS 3.0

Directory traversal vulnerability in the "Upload Groupkey" functionality in the Web Configuration Utility in Meinberg LANTIME devices with firmware before 6.24.004 allows remote authenticated users with Admin-User access to write to arbitrary files and consequently gain root privileges by uploading a file, as demonstrated by storing a file in the cron.d directory.

Path Traversal
WAF: High

CVE-2017-14101

CRITICAL
9.80 CVSS 3.0

A security researcher found an XML External Entity (XXE) vulnerability on the Conserus Image Repository archive solution version 2.1.1.105 by McKesson Medical Imaging Company, which is now a Change Healthcare company. An unauthenticated user supplying a modified HTTP SOAP request to the vulnerable service allows for arbitrary file read access to the local file system as well as the transmittal of the application service's account hashed credentials to a remote attacker.

XML External Entity (XXE)
WAF: High

CVE-2017-15890

MEDIUM
4.80 CVSS 3.0

Cross-site scripting (XSS) vulnerability in Disclaimer in Synology MailPlus Server before 1.4.0-0415 allows remote authenticated users to inject arbitrary web script or HTML via the NAME parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17697

HIGH
8.60 CVSS 3.1

The Ping() function in ui/api/target.go in Harbor through 1.3.0-rc4 has SSRF via the endpoint parameter to /api/targets/ping.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2017-17695

HIGH
8.80 CVSS 3.0

Techno - Portfolio Management Panel through 2017-11-16 allows SQL Injection via the panel/search.php s parameter.

SQL Injection
WAF: High

CVE-2017-17694

MEDIUM
5.40 CVSS 3.0

Techno - Portfolio Management Panel through 2017-11-16 allows XSS via the panel/search.php s parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17693

MEDIUM
4.30 CVSS 3.0

Techno - Portfolio Management Panel through 2017-11-16 does not check authorization for panel/portfolio.php?action=delete requests that remove feedback.

Missing Authorization
WAF: Low

CVE-2017-17405

HIGH
8.80 CVSS 3.0

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

OS Command Injection
WAF: High

CVE-2017-5264

HIGH
8.80 CVSS 3.0

Versions of Nexpose prior to 6.4.66 fail to adequately validate the source of HTTP requests intended for the Automated Actions administrative web application, and are susceptible to a cross-site request forgery (CSRF) attack.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2016-10703

HIGH
7.50 CVSS 3.1

A regular expression Denial of Service (DoS) vulnerability in the file lib/ecstatic.js of the ecstatic npm package, before version 2.0.0, allows a remote attacker to overload and crash a server by passing a maliciously crafted string.

Improper Input Validation
WAF: Medium

CVE-2017-5663

HIGH
8.80 CVSS 3.0

In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating, an authenticated user with client/loan/center/staff/group read permissions is able to inject malicious SQL into SELECT queries. The 'sqlSearch' parameter on a number of endpoints is not sanitized and appended directly to the query.

SQL Injection
WAF: High

CVE-2017-17682

MEDIUM
6.50 CVSS 3.0

In ImageMagick 7.0.7-12 Q16, a large loop vulnerability was found in the function ExtractPostscript in coders/wpg.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted wpg image file that triggers a ReadWPGImage call.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2017-17672

CRITICAL
9.80 CVSS 3.0

In vBulletin through 5.3.x, there is an unauthenticated deserialization vulnerability that leads to arbitrary file deletion and, under certain circumstances, code execution, because of unsafe usage of PHP's unserialize() in vB_Library_Template's cacheTemplates() function, which is a publicly exposed API. This is exploited with the templateidlist parameter to ajax/api/template/cacheTemplates.

Insecure Deserialization
WAF: Medium

CVE-2017-17671

CRITICAL
9.80 CVSS 3.1

vBulletin through 5.3.x on Windows allows remote PHP code execution because a require_once call is reachable with an unauthenticated request that can include directory traversal sequences to specify an arbitrary pathname, and because ../ traversal is blocked but ..\ traversal is not blocked. For example, an attacker can make an invalid HTTP request containing PHP code, and then make an index.php?routestring= request with enough instances of ".." to reach an Apache HTTP Server log file.

Path Traversal
WAF: High

CVE-2017-17665

HIGH
8.80 CVSS 3.0

In Octopus Deploy before 4.1.3, the machine update process doesn't check that the user has access to all environments. This allows an access-control bypass because the set of environments to which a machine is scoped may include environments in which the user lacks access.

Missing Authorization
WAF: Low

CVE-2017-14380

MEDIUM
6.70 CVSS 3.0

In EMC Isilon OneFS 8.1.0.0, 8.0.1.0 - 8.0.1.1, 8.0.0.0 - 8.0.0.4, 7.2.1.0 - 7.2.1.5, 7.2.0.x, and 7.1.1.x, a malicious compliance admin (compadmin) account user could exploit a vulnerability in isi_get_itrace or isi_get_profile maintenance scripts to run any shell script as system root on a cluster in compliance mode. This could potentially lead to an elevation of privilege for the compadmin user and violate compliance mode.

Improper Privilege Management
WAF: Low

CVE-2017-15529

MEDIUM
6.20 CVSS 3.0

Prior to 4.4.1.10, the Norton Family Android App can be susceptible to a Denial of Service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular device unavailable to its intended user by temporarily or indefinitely disrupting services of a specific host within a network.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2017-1558

MEDIUM
6.10 CVSS 3.0

IBM Maximo Asset Management 7.5 and 7.6 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 131548.

Open Redirect
WAF: Medium

CVE-2017-1546

MEDIUM
5.40 CVSS 3.0

IBM DOORS Next Generation (DNG/RRC) 4.07, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130915.

Cross-Site Scripting (XSS)
WAF: High
Page 5 of 97 (4807 CVEs)