WAFPlanet

CVE Database - 2018

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

6718
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2018-16637

MEDIUM
5.40 CVSS 3.0

Evolution CMS 1.4.x allows XSS via the page weblink title parameter to the manager/ URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-16632

MEDIUM
4.80 CVSS 3.0

Mezzanine CMS v4.3.1 allows XSS via the /admin/blog/blogcategory/add/?_to_field=id&_popup=1 title parameter at admin/blog/blogpost/add/.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-16630

MEDIUM
4.80 CVSS 3.0

Kirby v2.5.12 allows XSS by using the "site files" Add option to upload an SVG file.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-7366

MEDIUM
6.80 CVSS 3.0

ZTE ZXV10 B860AV2.1 product ChinaMobile branch with the ICNT versions up to V1.3.3, the BESTV versions up to V1.2.2, the WASU versions up to V1.1.7 and the MGTV versions up to V1.4.6 have an authentication bypass vulnerability, which may allows an unauthorized user to perform unauthorized operations.

Incorrect Authorization
WAF: Low

CVE-2018-5204

CRITICAL
9.80 CVSS 3.0

ML Report version Between 2.00.000.0000 and 2.18.628.5980 contains a vulnerability that could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. this can be leveraged for code execution.

Unrestricted File Upload
WAF: Medium

CVE-2018-5203

CRITICAL
9.80 CVSS 3.0

DEXTUploadX5 version Between 1.0.0.0 and 2.2.0.0 contains a vulnerability that could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. this can be leveraged for code execution.

Improper Input Validation
WAF: Medium

CVE-2018-20572

CRITICAL
9.80 CVSS 3.0

WUZHI CMS 4.1.0 allows coreframe/app/coupon/admin/copyfrom.php SQL injection via the index.php?m=promote&f=index&v=search keywords parameter, a related issue to CVE-2018-15893.

SQL Injection
WAF: High

CVE-2018-20569

CRITICAL
9.80 CVSS 3.0

user/index.php in Ivan Cordoba Generic Content Management System (CMS) through 2018-04-28 allows SQL injection for authentication bypass.

SQL Injection
WAF: High

CVE-2018-20568

CRITICAL
9.80 CVSS 3.0

Administrator/index.php in Ivan Cordoba Generic Content Management System (CMS) through 2018-04-28 allows SQL injection for authentication bypass.

SQL Injection
WAF: High

CVE-2018-20566

MEDIUM
5.30 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. It allows full path disclosure in "Smarty error: unable to read resource" error messages for a crafted installation page.

Path Traversal
WAF: High

CVE-2018-20565

MEDIUM
4.80 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. admin/nav.php?rec=update has XSS via the nav_name parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20564

MEDIUM
4.80 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. admin/product_category.php?rec=update has XSS via the cat_name parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20563

MEDIUM
4.80 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. admin/mobile.php?rec=system&act=update has XSS via the mobile_name parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20562

MEDIUM
4.80 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. admin/article_category.php?rec=update has XSS via the cat_name parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20561

MEDIUM
4.80 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. admin/article.php?rec=update has XSS via the title parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20560

MEDIUM
4.80 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. admin/show.php?rec=update has XSS via the show_name parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20559

MEDIUM
4.80 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. admin/product.php?rec=update has XSS via the name parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20558

MEDIUM
4.80 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. admin/system.php?rec=update has XSS via the site_name parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20557

MEDIUM
4.80 CVSS 3.0

An issue was discovered in DouCo DouPHP 1.5 20181221. admin/page.php?rec=edit has XSS via the page_name parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20551

MEDIUM
6.50 CVSS 3.0

A reachable Object::getString assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to construction of invalid rich media annotation assets in the AnnotRichMedia class in Annot.c.

Improper Input Validation
WAF: Medium

CVE-2018-20543

MEDIUM
6.50 CVSS 3.0

There is an attempted excessive memory allocation at libxsmm_sparse_csc_reader in generator_spgemm_csc_reader.c in LIBXSMM 1.10 that will cause a denial of service.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2018-20539

MEDIUM
6.50 CVSS 3.0

There is a Segmentation fault triggered by illegal address access at liblas::SpatialReference::GetGTIF() (spatialreference.cpp) in libLAS 1.8.1 that will cause a denial of service.

Improper Input Validation
WAF: Medium

CVE-2018-20530

MEDIUM
5.40 CVSS 3.0

PHP Scripts Mall Website Seller Script 2.0.5 has XSS via a Profile field such as Company Address, a related issue to CVE-2018-15896.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20528

MEDIUM
6.50 CVSS 3.0

JEECMS 9 has SSRF via the ueditor/getRemoteImage.jspx upfile parameter.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2018-1000890

HIGH
7.50 CVSS 3.0

FrontAccounting 2.4.5 contains a Time Based Blind SQL Injection vulnerability in the parameter "filterType" in /attachments.php that can allow the attacker to grab the entire database of the application.

SQL Injection
WAF: High

CVE-2018-1000889

HIGH
8.80 CVSS 3.0

Logisim Evolution version 2.14.3 and earlier contains an XML External Entity (XXE) vulnerability in Circuit file loading functionality (loadXmlFrom in src/com/cburch/logisim/file/XmlReader.java) that can result in information leak, possible RCE depending on system configuration. This attack appears to be exploitable via the victim opening a specially crafted circuit file. This vulnerability appears to have been fixed in 2.14.4.

XML External Entity (XXE)
WAF: High

CVE-2018-1000888

HIGH
8.80 CVSS 3.0

PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc). When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `phar://[path_to_malicious_phar_file]` as path. Object injection can be used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar class itself. With Archive_Tar object injection, arbitrary file deletion can occur because `@unlink($this->_temp_tarname)` is called. If another class with useful gadget is loaded, it may possible to cause remote code execution that can result in files being deleted or possibly modified. This vulnerability appears to have been fixed in 1.4.4.

Insecure Deserialization
WAF: Medium

CVE-2018-1000887

MEDIUM
4.80 CVSS 3.0

Peel shopping peel-shopping_9_1_0 version contains a Cross Site Scripting (XSS) vulnerability that can result in an authenticated user injecting java script code in the "Site Name EN" parameter. This attack appears to be exploitable if the malicious user has access to the administration account.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-1000631

CRITICAL
9.80 CVSS 3.0

Battelle V2I Hub 3.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the tmx/TmxCtl/src/lib/PluginStatus.cpp and TmxControl::user_info() function, which could allow the attacker to view, add, modify or delete information in the back-end database.

SQL Injection
WAF: High

CVE-2018-1000630

HIGH
7.20 CVSS 3.0

Battelle V2I Hub 2.5.1 is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to /api/PluginStatusActions.php and /status/pluginStatus.php using the jtSorting or id parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.

SQL Injection
WAF: High

CVE-2018-1000629

MEDIUM
6.10 CVSS 3.0

Battelle V2I Hub 2.5.1 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by api/SystemConfigActions.php?action=add and the index.php script. A remote attacker could exploit this vulnerability using the parameterName or _login_username parameter in a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-1000624

HIGH
7.50 CVSS 3.0

Battelle V2I Hub 2.5.1 is vulnerable to a denial of service, caused by the failure to restrict access to a sensitive functionality. By visiting http://V2I_HUB/UI/powerdown.php, a remote attacker could exploit this vulnerability to shut down the system.

Improper Privilege Management
WAF: Low

CVE-2018-15334

MEDIUM
4.30 CVSS 3.0

A cross-site request forgery (CSRF) vulnerability in the APM webtop 11.2.1 or greater may allow attacker to force an APM webtop session to log out and require re-authentication.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-15333

MEDIUM
5.50 CVSS 3.0

On versions 11.2.1. and greater, unrestricted Snapshot File Access allows BIG-IP system's user with any role, including Guest Role, to have access and download previously generated and available snapshot files on the BIG-IP configuration utility such as QKView and TCPDumps.

Unrestricted File Upload
WAF: Medium

CVE-2018-20524

MEDIUM
6.10 CVSS 3.0

The Chat Anywhere extension 2.4.0 for Chrome allows XSS via crafted use of <<a> in a message, because a danmuWrapper DIV element in chatbox-only\danmu.js is outside the scope of a Content Security Policy (CSP).

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20520

MEDIUM
6.10 CVSS 3.0

MiniCMS V1.10 has XSS via the mc-admin/post-edit.php query string, a related issue to CVE-2018-10296 and CVE-2018-16233.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20519

HIGH
8.10 CVSS 3.0

An issue was discovered in 74cms v4.2.111. It allows remote authenticated users to read or modify arbitrary resumes by changing a job-search intention, as demonstrated by the index.php?c=Personal&a=ajax_save_basic pid parameter.

Improper Input Validation
WAF: Medium

CVE-2018-20508

CRITICAL
9.80 CVSS 3.0

CrashFix 1.0.4 has SQL Injection via the User[status] parameter. This is related to actionIndex in UserController.php, and the protected\models\User.php search() function.

SQL Injection
WAF: High

CVE-2018-20502

MEDIUM
6.50 CVSS 3.0

An issue was discovered in Bento4 1.5.1-627. There is an attempt at excessive memory allocation in the AP4_DataBuffer class when called from AP4_HvccAtom::Create in Core/Ap4HvccAtom.cpp.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2018-20404

HIGH
7.50 CVSS 3.0

ETK_E900.sys, a SmartETK driver for VIA Technologies EPIA-E900 system board, is vulnerable to denial of service attack via IOCTL 0x9C402048, which calls memmove and constantly fails on an arbitrary (uncontrollable) address, resulting in an eternal hang or a BSoD.

Improper Input Validation
WAF: Medium

CVE-2018-19871

MEDIUM
6.50 CVSS 3.0

An issue was discovered in Qt before 5.11.3. There is QTgaFile Uncontrolled Resource Consumption.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2018-19869

MEDIUM
6.50 CVSS 3.0

An issue was discovered in Qt before 5.11.3. A malformed SVG image causes a segmentation fault in qsvghandler.cpp.

Improper Input Validation
WAF: Medium

CVE-2018-19799

MEDIUM
6.10 CVSS 3.0

Dolibarr ERP/CRM through 8.0.3 has /exports/export.php?datatoexport= XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19616

HIGH
8.10 CVSS 3.0

An issue was discovered in Rockwell Automation Allen-Bradley PowerMonitor 1000. An unauthenticated user can add/edit/remove administrators because access control is implemented on the client side via a disabled attribute for a BUTTON element.

Improper Authentication
WAF: Low

CVE-2018-19615

MEDIUM
6.10 CVSS 3.1

Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arbitrary code into a targeted user’s web browser to gain access to the affected device.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19182

HIGH
8.80 CVSS 3.0

Engelsystem before commit hash 2e28336 allows CSRF.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-20486

MEDIUM
6.10 CVSS 3.0

MetInfo 6.x through 6.1.3 has XSS via the /admin/login/login_check.php url_array[] parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20485

MEDIUM
6.10 CVSS 3.0

Zoho ManageEngine ADSelfService Plus 5.7 before build 5702 has XSS in the employee search feature.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-20484

MEDIUM
6.10 CVSS 3.0

Zoho ManageEngine ADSelfService Plus 5.7 before build 5702 has XSS in the self-update layout implementation.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-0724

MEDIUM
6.10 CVSS 3.0

Cross-site scripting (XSS) vulnerability in Q'center Virtual Appliance 1.8.1014 and earlier versions could allow remote attackers to inject Javascript code in the compromised application, a different vulnerability than CVE-2018-0723.

Cross-Site Scripting (XSS)
WAF: High
Page 2 of 135 (6718 CVEs)