Filtered by vendor Flexense
Subscribe
Search
Total
8 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2020-29659 | 1 Flexense | 1 Dupscout | 2020-12-17 | 10.0 HIGH | 9.8 CRITICAL |
| A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack. | |||||
| CVE-2018-6481 | 1 Flexense | 1 Disksavvy | 2020-09-22 | 7.5 HIGH | 9.8 CRITICAL |
| A buffer overflow vulnerability in the control protocol of Disk Savvy Enterprise v10.4.18 allows remote attackers to execute arbitrary code by sending a crafted packet to TCP port 9124. | |||||
| CVE-2018-5262 | 1 Flexense | 1 Diskboss | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
| A stack-based buffer overflow in Flexense DiskBoss 8.8.16 and earlier allows unauthenticated remote attackers to execute arbitrary code in the context of a highly privileged account. | |||||
| CVE-2018-6537 | 1 Flexense | 1 Syncbreeze | 2018-02-15 | 7.5 HIGH | 9.8 CRITICAL |
| A buffer overflow vulnerability in the control protocol of Flexense SyncBreeze Enterprise v10.4.18 allows remote attackers to execute arbitrary code by sending a crafted packet to TCP port 9121. | |||||
| CVE-2017-13696 | 1 Flexense | 4 Diskpulse, Disksavvy, Dupscout and 1 more | 2018-02-13 | 10.0 HIGH | 9.8 CRITICAL |
| A buffer overflow vulnerability lies in the web server component of Dup Scout Enterprise 9.9.14, Disk Savvy Enterprise 9.9.14, Sync Breeze Enterprise 9.9.16, and Disk Pulse Enterprise 9.9.16 where an attacker can craft a malicious GET request and exploit the web server component. Successful exploitation of the software will allow an attacker to gain complete access to the system with NT AUTHORITY / SYSTEM level privileges. The vulnerability lies due to improper handling and sanitization of the incoming request. | |||||
| CVE-2017-15220 | 1 Flexense | 1 Vx Search | 2017-10-26 | 7.5 HIGH | 9.8 CRITICAL |
| Flexense VX Search Enterprise 10.1.12 is vulnerable to a buffer overflow via an empty POST request to a long URI beginning with a /../ substring. This allows remote attackers to execute arbitrary code. | |||||
| CVE-2017-14980 | 1 Flexense | 1 Syncbreeze | 2017-10-20 | 7.5 HIGH | 9.8 CRITICAL |
| Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login. | |||||
| CVE-2017-6416 | 1 Flexense | 1 Sysgauge | 2017-03-08 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in SysGauge 1.5.18. A buffer overflow vulnerability in SMTP connection verification leads to arbitrary code execution. The attack vector is a crafted SMTP daemon that sends a long 220 (aka "Service ready") string. | |||||
