Insyde InsydeH2O denial of service | US-CERT VU#811862
NAME__________Insyde InsydeH2O denial of servicePlatforms Affected:Insyde InsydeH2O 5.2 Insyde InsydeH2O 5.3 Insyde InsydeH2O 5.4 Insyde InsydeH2O 5.5 Insyde InsydeH2O 5.6Risk...
NAME__________Insyde InsydeH2O denial of servicePlatforms Affected:Insyde InsydeH2O 5.2 Insyde InsydeH2O 5.3 Insyde InsydeH2O 5.4 Insyde InsydeH2O 5.5 Insyde InsydeH2O 5.6Risk...
NAME__________git-urls denial of servicePlatforms Affected:git-urls git-urls 1.0.0Risk Level:7.5Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________git-urls is vulnerable to a denial of service,...
NAME__________Phoenix Technologies Phoenix SecureCore code executionPlatforms Affected:Phoenix Technologies Phoenix SecureCoreRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Phoenix Technologies Phoenix SecureCore could allow a local...
NAME__________Golang Go information disclosurePlatforms Affected:Golang Go 1.19.5Risk Level:5.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Golang Go could allow a remote attacker to obtain sensitive information,...
NAME__________AMI AptioV code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI AptioV could allow a local authenticated attacker to execute arbitrary...
NAME__________EspoCRM server-side request forgeryPlatforms Affected:EspoCRM EspoCRM 8.0.4Risk Level:5.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________EspoCRM is vulnerable to server-side request forgery, caused by...
NAME__________Devolutions Workspace information disclosurePlatforms Affected:Devolutions Devolutions Workspace 2023.3.2.0Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Devolutions Workspace could allow a remote authenticated attacker to obtain...
NAME__________AMI Aptio V code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI Aptio V could allow a local authenticated attacker to...
NAME__________IBM Informix Dynamic Server buffer overflowPlatforms Affected:IBM Informix Dynamic Server 14.10 IBM Informix Dynamic Server 12.10Risk Level:6.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IBM...
NAME__________IBM Informix Dynamic Server buffer overflowPlatforms Affected:IBM Informix Dynamic Server 14.10 IBM Informix Dynamic Server 12.10Risk Level:6.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IBM...
NAME__________Email Subscription Popup plugin for WordPress cross-site scriptingPlatforms Affected:Risk Level:6.1Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________Email Subscription Popup plugin for WordPress is vulnerable to...
NAME__________Tenda AX9 SQL injectionPlatforms Affected:Tenda AX9 22.03.01.46Risk Level:5.4Exploitability:HighConsequences:Gain Access DESCRIPTION__________Tenda AX9 is vulnerable to SQL injection. A remote attacker could...
NAME__________Insyde InsydeH2O denial of servicePlatforms Affected:Insyde InsydeH2O 5.2 Insyde InsydeH2O 5.3 Insyde InsydeH2O 5.4 Insyde InsydeH2O 5.5 Insyde InsydeH2O 5.6Risk...
NAME__________Microsoft Edge (Chromium-based) information disclosurePlatforms Affected:Microsoft Edge (Chromium-based)Risk Level:4.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Microsoft Edge (Chromium-based) could allow a remote attacker to obtain...
NAME__________webMethods security bypassPlatforms Affected:Software AG webMethods 10.11Risk Level:7.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________webMethods could allow a remote attacker to bypass security restrictions, caused...
NAME__________ICONICS SCADA Suite code executionPlatforms Affected:Risk Level:6.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ICONICS SCADA Suite could allow a remote authenticated attacker to execute arbitrary...
NAME__________AMI Aptio V code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI Aptio V could allow a local authenticated attacker to...
NAME__________AMI AptioV code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI AptioV could allow a local authenticated attacker to execute arbitrary...
NAME__________Phoenix Technologies Phoenix SecureCore code executionPlatforms Affected:Phoenix Technologies Phoenix SecureCoreRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Phoenix Technologies Phoenix SecureCore could allow a local...
NAME__________osCommerce SQL injectionPlatforms Affected:Risk Level:7.3Exploitability:UnprovenConsequences:Data Manipulation DESCRIPTION__________osCommerce is vulnerable to SQL injection. A remote attacker could send specially crafted SQL...
NAME__________Huawei HarmonyOS denial of servicePlatforms Affected:Huawei HarmonyOS 2.0.0 Huawei HarmonyOS 2.1.0 Huawei HarmonyOS 3.0.0 Huawei HarmonyOS 3.1.0 Huawei HarmonyOS 4.0.0Risk...
NAME__________Appointment Scheduler code executionPlatforms Affected:PHPJabbers Appointment Scheduler 3.0Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Appointment Scheduler could allow a remote authenticated attacker to execute...
NAME__________Appointment Scheduler HTML injectionPlatforms Affected:PHPJabbers Appointment Scheduler 3.0Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Appointment Scheduler is vulnerable to HTML injection. A remote authenticated...
NAME__________Appointment Scheduler cross-site scriptingPlatforms Affected:PHPJabbers Appointment Scheduler 3.0Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Appointment Scheduler is vulnerable to cross-site scripting, caused by improper...