Filtered by vendor Mk-auth Subscriptions
Total 9 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2020-14069 1 Mk-auth 1 Mk-auth 2024-08-04 6.8 Medium
An issue was discovered in MK-AUTH 19.01. There are SQL injection issues in mkt/ PHP scripts, as demonstrated by arp.php, dhcp.php, hotspot.php, ip.php, pgaviso.php, pgcorte.php, pppoe.php, queues.php, and wifi.php.
CVE-2020-14068 1 Mk-auth 1 Mk-auth 2024-08-04 9.8 Critical
An issue was discovered in MK-AUTH 19.01. The web login functionality allows an attacker to bypass authentication and gain client privileges via SQL injection in central/executar_login.php.
CVE-2020-14071 1 Mk-auth 1 Mk-auth 2024-08-04 6.1 Medium
An issue was discovered in MK-AUTH 19.01. XSS vulnerabilities in admin and client scripts allow an attacker to execute arbitrary JavaScript code.
CVE-2020-14072 1 Mk-auth 1 Mk-auth 2024-08-04 9.8 Critical
An issue was discovered in MK-AUTH 19.01. It allows command execution as root via shell metacharacters to /auth admin scripts.
CVE-2020-14070 1 Mk-auth 1 Mk-auth 2024-08-04 9.8 Critical
An issue was discovered in MK-AUTH 19.01. There is authentication bypass in the web login functionality because guessable credentials to admin/executar_login.php result in admin access.
CVE-2021-21495 1 Mk-auth 1 Mk-auth 2024-08-03 8.8 High
MK-AUTH through 19.01 K4.9 allows CSRF for password changes via the central/executar_central.php?acao=altsenha_princ URI.
CVE-2021-21494 1 Mk-auth 1 Mk-auth 2024-08-03 4.8 Medium
MK-AUTH through 19.01 K4.9 allows XSS via the admin/logs_ajax.php tipo parameter. An attacker can leverage this to read the centralmka2 (session token) cookie, which is not set to HTTPOnly.
CVE-2021-3005 1 Mk-auth 1 Mk-auth 2024-08-03 4.3 Medium
MK-AUTH through 19.01 K4.9 allows remote attackers to obtain sensitive information (e.g., a CPF number) via a modified titulo (aka invoice number) value to the central/recibo.php URI.
CVE-2023-27246 1 Mk-auth 1 Mk-auth 2024-08-02 8.8 High
An arbitrary file upload vulnerability in the Virtual Disk of MK-Auth 23.01K4.9 allows attackers to execute arbitrary code via uploading a crafted .htaccess file.