Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Froxlor Subscribe
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-10237 1 Froxlor 1 Froxlor 2021-07-21 2.1 LOW 5.5 MEDIUM
An issue was discovered in Froxlor through 0.10.15. The installer wrote configuration parameters including passwords into files in /tmp, setting proper permissions only after writing the sensitive data. A local attacker could have disclosed the information if he read the file at the right time, because of _createUserdataConf in install/lib/class.FroxlorInstall.php.
CVE-2018-1000527 1 Froxlor 1 Froxlor 2020-08-24 6.5 MEDIUM 7.2 HIGH
Froxlor version <= 0.9.39.5 contains a PHP Object Injection vulnerability in Domain name form that can result in Possible information disclosure and remote code execution. This attack appear to be exploitable via Passing malicious PHP objection in $_POST['ssl_ipandport']. This vulnerability appears to have been fixed in after commit c1e62e6.
CVE-2020-10236 1 Froxlor 1 Froxlor 2020-03-09 3.6 LOW 6.1 MEDIUM
An issue was discovered in Froxlor before 0.10.14. It created files with static names in /tmp during installation if the installation directory was not writable. This allowed local attackers to cause DoS or disclose information out of the config files, because of _createUserdataConf in install/lib/class.FroxlorInstall.php.
CVE-2018-12642 1 Froxlor 1 Froxlor 2019-10-02 5.0 MEDIUM 7.5 HIGH
Froxlor through 0.9.39.5 has Incorrect Access Control for tickets not owned by the current user.
CVE-2015-5959 1 Froxlor 1 Froxlor 2017-09-07 5.0 MEDIUM 9.8 CRITICAL
Froxlor before 0.9.33.2 with the default configuration/setup might allow remote attackers to obtain the database password by reading /logs/sql-error.log.
CVE-2016-5100 1 Froxlor 1 Froxlor 2017-02-24 5.0 MEDIUM 9.8 CRITICAL
Froxlor before 0.9.35 uses the PHP rand function for random number generation, which makes it easier for remote attackers to guess the password reset token by predicting a value.