Filtered by vendor Flexense
Subscribe
Total
32 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-17996 | 1 Flexense | 1 Syncbreeze | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
A buffer overflow vulnerability in "Add command" functionality exists in Flexense SyncBreeze Enterprise <= 10.3.14. The vulnerability can be triggered by an authenticated attacker who submits more than 5000 characters as the command name. It will cause termination of the SyncBreeze Enterprise server and possibly remote command execution with SYSTEM privilege. | |||||
CVE-2017-17099 | 1 Flexense | 1 Syncbreeze | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
There exists an unauthenticated SEH based Buffer Overflow vulnerability in the HTTP server of Flexense SyncBreeze Enterprise v10.1.16. When sending a GET request with an excessive length, it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows SYSTEM account. | |||||
CVE-2017-17088 | 1 Flexense | 1 Syncbreeze | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
The Enterprise version of SyncBreeze 10.2.12 and earlier is affected by a Remote Denial of Service vulnerability. The web server does not check bounds when reading server requests in the Host header on making a connection, resulting in a classic Buffer Overflow that causes a Denial of Service. | |||||
CVE-2017-15950 | 1 Flexense | 1 Syncbreeze | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Flexense SyncBreeze Enterprise version 10.1.16 is vulnerable to a buffer overflow that can be exploited for arbitrary code execution. The flaw is triggered by providing a long input into the "Destination directory" field, either within an XML document or through use of passive mode. | |||||
CVE-2017-15667 | 1 Flexense | 1 Sysgauge | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In Flexense SysGauge Server 3.6.18, the Control Protocol suffers from a denial of service. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9221. | |||||
CVE-2017-15665 | 1 Flexense | 1 Diskboss | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In Flexense DiskBoss Enterprise 8.5.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 8094. | |||||
CVE-2017-15664 | 1 Flexense | 1 Syncbreeze | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In Flexense Sync Breeze Enterprise v10.1.16, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9121. | |||||
CVE-2017-15663 | 1 Flexense | 1 Disk Pulse | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In Flexense Disk Pulse Enterprise v10.1.18, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9120. | |||||
CVE-2017-15662 | 1 Flexense | 1 Vx Search | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In Flexense VX Search Enterprise v10.1.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9123. | |||||
CVE-2017-15220 | 1 Flexense | 1 Vx Search | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Flexense VX Search Enterprise 10.1.12 is vulnerable to a buffer overflow via an empty POST request to a long URI beginning with a /../ substring. This allows remote attackers to execute arbitrary code. | |||||
CVE-2017-14980 | 1 Flexense | 1 Syncbreeze | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login. | |||||
CVE-2017-13696 | 1 Flexense | 4 Diskpulse, Disksavvy, Dupscout and 1 more | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
A buffer overflow vulnerability lies in the web server component of Dup Scout Enterprise 9.9.14, Disk Savvy Enterprise 9.9.14, Sync Breeze Enterprise 9.9.16, and Disk Pulse Enterprise 9.9.16 where an attacker can craft a malicious GET request and exploit the web server component. Successful exploitation of the software will allow an attacker to gain complete access to the system with NT AUTHORITY / SYSTEM level privileges. The vulnerability lies due to improper handling and sanitization of the incoming request. |