Page 2 of 11 results (0.004 seconds)

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 0

Uncontrolled Resource Consumption vulnerability in PlexTrac allows WebSocket DoS.This issue affects PlexTrac: from 1.61.3 before 2.8.1. • https://docs.plextrac.com/plextrac-documentation/master/security-advisories#release-2.11.0 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PlexTrac allows arbitrary file writes.This issue affects PlexTrac: from 1.61.3 before 2.8.1. • https://docs.plextrac.com/plextrac-documentation/master/security-advisories#release-2.11.0 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.9EPSS: 0%CPEs: 1EXPL: 0

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PlexTrac allows arbitrary file writes.This issue affects PlexTrac: from 1.61.3 before 2.8.1. • https://docs.plextrac.com/plextrac-documentation/master/security-advisories#release-2.11.0 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The PlexTrac platform prior to version 1.28.0 allows for username enumeration via HTTP response times on invalid login attempts for users configured to use the PlexTrac authentication provider. Login attempts for valid, unlocked users configured to use PlexTrac as their authentication provider take significantly longer than those for invalid users, allowing for valid users to be enumerated by an unauthenticated remote attacker. Note that the lockout policy implemented in Plextrac version 1.17.0 makes it impossible to distinguish between valid, locked user accounts and user accounts that do not exist, but does not prevent valid, unlocked users from being enumerated. La plataforma PlexTrac versiones anteriores a 1.28.0 permite la enumeración de nombres de usuario por medio de tiempos de respuesta HTTP en intentos de inicio de sesión no válidos para usuarios configurados para usar el proveedor de autenticación PlexTrac. Los intentos de inicio de sesión para usuarios desbloqueados válidos configurados para usar PlexTrac como su proveedor de autenticación tardan mucho más que los de usuarios no válidos, lo que permite a un atacante remoto no autenticado enumerar a usuarios válidos. • http://plextrac.com https://www.controlgap.com/blog/a-plextrac-story • CWE-203: Observable Discrepancy •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The PlexTrac platform prior to version 1.17.0 does not restrict excessive authentication attempts for accounts configured to use the PlexTrac authentication provider. An unauthenticated remote attacker could perform a bruteforce attack on the login page with no time or attempt limitation in an attempt to obtain valid credentials for the platform users configured to use the PlexTrac authentication provider. La plataforma PlexTrac versiones anteriores a 1.17.0 no restringe los intentos de autenticación excesivos para las cuentas configuradas para usar el proveedor de autenticación PlexTrac. Un atacante remoto no autenticado podría llevar a cabo un ataque de fuerza bruta en la página de inicio de sesión sin límite de tiempo o de intento en un intento de obtener credenciales válidas para usuarios de la plataforma configurados para usar el proveedor de autenticación PlexTrac • http://plextrac.com https://www.controlgap.com/blog/a-plextrac-story • CWE-307: Improper Restriction of Excessive Authentication Attempts •