When we discover vulnerabilities in third party software, we disclose them responsibly and publish them here.
Published: 2021-08-24 | Severity: Medium
An authenticated user can read, create and replace arbitrary files to any location on an Aviatrix Cloud Controller. These files could include configuration files, Aviatrix source code, or PHP scripts, which would allow the attacker to run code of their choosing on the host.
Read morePublished: 2021-08-24 | Severity: High
An authenticated user can upload arbitrary files to a web directory on an Aviatrix Cloud Controller. These files could include PHP scripts, which would allow the attacker to run code of their choosing on the host.
Read morePublished: 2020-02-05 | Severity: High
A CSRF vulnerability allows an unauthenticated attacker to take over the Wordpress installation
Read morePublished: 2020-02-05 | Severity: Medium
A CSRF vulnerability allows an unauthenticated attacker to delete the Wordpress installation
Read morePublished: 2018-06-06 | Severity: High
If logged in as an administrator of any WordPress blog on a WordPress multisite, you can run arbitrary code and completely compromise the system by using the setup page for the Redirection plugin.
Read morePublished: 2018-06-06 | Severity: High
It is possible for a user with the administrator privilege to execute arbitrary code.
Read morePublished: 2018-04-10 | Severity: High
If logged in as an administrator on any site, you can extract all values in the database, including password hashes and user activation tokens.
Read morePublished: 2018-03-26 | Severity: Medium
Data about users and devices, including email addresses and IMEI identifiers, can be obtained without authentication from XenMobile up to version 10.7
Read morePublished: 2018-03-26 | Severity: High
XenMobile runs, inside its firewall, a vulnerable version of a Hazelcast server.
Read morePublished: 2018-03-26 | Severity: High
XenMobile includes a service listening on port 5001 within its firewall that can be used to create a remote code execution vulnerability.
Read morePublished: 2018-03-26 | Severity: Medium
XenMobile can be tricked into displaying content of the attacker’s choosing
Read morePublished: 2018-03-26 | Severity: Medium
XenMobile contains open redirect vulnerabilities. This is a class of vulnerability where a service will redirect a user to a location controlled by an attacker.
Read morePublished: 2018-03-26 | Severity: High
Users who can make network requests from localhost can run commands as root.
Read morePublished: 2018-03-26 | Severity: High
It is possible to upload JSP files to XenMobile’s Tomcat server, leading to arbitrary code execution.
Read morePublished: 2018-03-26 | Severity: Medium
It was possible to upload files to the XenMobile server without authentication.
Read morePublished: 2018-03-26 | Severity: High
It is possible read most of the files and make network calls to private services on the XenMobile servers without authenticating.
Read more