Filtered by vendor Ajenti
Subscribe
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-25066 | 1 Ajenti | 1 Ajenti | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
A vulnerability has been found in ajenti 2.1.31 and classified as critical. This vulnerability affects unknown code of the component API. The manipulation leads to privilege escalation. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.32 is able to address this issue. The name of the patch is 7aa146b724e0e20cfee2c71ca78fafbf53a8767c. It is recommended to upgrade the affected component. | |||||
CVE-2018-18548 | 1 Ajenti | 1 Ajenticp | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ajenticp (aka Ajenti Docker control panel) for Ajenti through v1.2.23.13 has XSS via a filename that is mishandled in File Manager. | |||||
CVE-2018-1000082 | 1 Ajenti | 1 Ajenti | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
Ajenti version version 2 contains a Cross ite Request Forgery (CSRF) vulnerability in the command execution panel of the tool used to manage the server. that can result in Code execution on the server . This attack appear to be exploitable via Being a CSRF, victim interaction is needed, when the victim access the infected trigger of the CSRF any code that match the victim privledges on the server can be executed.. | |||||
CVE-2018-1000126 | 1 Ajenti | 1 Ajenti | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Ajenti version 2 contains an Information Disclosure vulnerability in Line 176 of the code source that can result in user and system enumeration as well as data from the /etc/ajenti/config.yml file. This attack appears to be exploitable via network connectivity to the web application. | |||||
CVE-2018-1000083 | 1 Ajenti | 1 Ajenti | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. This attack appear to be exploitable via By sending a malformed JSON, the tool responds with a traceback error that leaks a path of the server. | |||||
CVE-2018-1000080 | 1 Ajenti | 1 Ajenti | 2024-02-04 | 4.0 MEDIUM | 6.5 MEDIUM |
Ajenti version version 2 contains a Insecure Permissions vulnerability in Plugins download that can result in The download of any plugins as being a normal user. This attack appear to be exploitable via By knowing how the requisition is made, and sending it as a normal user, the server, in response, downloads the plugin. | |||||
CVE-2018-1000081 | 1 Ajenti | 1 Ajenti | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Ajenti version version 2 contains a Input Validation vulnerability in ID string on Get-values POST request that can result in Server Crashing. This attack appear to be exploitable via An attacker can freeze te server by sending a giant string to the ID parameter .. | |||||
CVE-2014-2260 | 1 Ajenti | 1 Ajenti | 2024-02-04 | 3.5 LOW | N/A |
Cross-site scripting (XSS) vulnerability in plugins/main/content/js/ajenti.coffee in Eugene Pankov Ajenti 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via the command field in the Cron functionality. | |||||
CVE-2014-4301 | 1 Ajenti | 1 Ajenti | 2024-02-04 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in the respond_error function in routing.py in Eugene Pankov Ajenti before 1.2.21.7 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) resources.js or (2) resources.css in ajenti:static/, related to the traceback page. |