Latest CVE Feed
-
8.8
HIGHCVE-2016-9497
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. By default, port 1953 is accessible via telnet and does not require authentication. An unau... Read more
Affected Products : hn7740s_firmware dw7000_firmware hn7000s_firmware hn7000sm_firmware hn7740s dw7000 hn7000s hn7000sm- EPSS Score: %3.88
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2016-9496
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, lacks authentication. An unauthenticated user may send an HTTP GET request to http://[ip]/com/gatewayreset or http://[ip]/cgi/reboot.bin to cause the modem to reboot.... Read more
Affected Products : hn7740s_firmware dw7000_firmware hn7000s_firmware hn7000sm_firmware hn7740s dw7000 hn7000s hn7000sm- EPSS Score: %2.44
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2016-9495
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, uses hard coded credentials. Access to the device's default telnet port (23) can be obtained through using one of a few default credentials shared among all devices.... Read more
Affected Products : hn7740s_firmware dw7000_firmware hn7000s_firmware hn7000sm_firmware hn7740s dw7000 hn7000s hn7000sm- EPSS Score: %0.22
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2016-9494
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, are potentially vulnerable to improper input validation. The device's advanced status web page that is linked to from the basic status web page does not appear to proper... Read more
Affected Products : hn7740s_firmware dw7000_firmware hn7000s_firmware hn7000sm_firmware hn7740s dw7000 hn7000s hn7000sm- EPSS Score: %0.24
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2016-9493
The code generated by PHP FormMail Generator prior to 17 December 2016 is vulnerable to stored cross-site scripting. In the generated form.lib.php file, upload file types are checked against a hard-coded list of dangerous extensions. This list does not in... Read more
Affected Products : php_formmail_generator- EPSS Score: %0.21
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-9492
The code generated by PHP FormMail Generator prior to 17 December 2016 is vulnerable to unrestricted upload of dangerous file types. In the generated form.lib.php file, upload file types are checked against a hard-coded list of dangerous extensions. This ... Read more
Affected Products : php_formmail_generator- EPSS Score: %0.83
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.8
MEDIUMCVE-2016-9491
ManageEngine Applications Manager 12 and 13 before build 13690 allows an authenticated user, who is able to access /register.do page (most likely limited to administrator), to browse the filesystem and read the system files, including Applications Manager... Read more
Affected Products : manageengine_applications_manager- EPSS Score: %0.81
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2016-9490
ManageEngine Applications Manager versions 12 and 13 before build 13200 suffer from a Reflected Cross-Site Scripting vulnerability. Applications Manager is prone to a Cross-Site Scripting vulnerability in parameter LIMIT, in URL path /DiagAlertAction.do?R... Read more
- EPSS Score: %0.85
- Published: Jun. 05, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2016-9489
In ManageEngine Applications Manager 12 and 13 before build 13200, an authenticated user is able to alter all of their own properties, including own group, i.e. changing their group to one with higher privileges like "ADMIN". A user is also able to change... Read more
Affected Products : manageengine_applications_manager- EPSS Score: %0.36
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-9488
ManageEngine Applications Manager versions 12 and 13 before build 13200 suffer from remote SQL injection vulnerabilities. An unauthenticated attacker is able to access the URL /servlet/MenuHandlerServlet, which is vulnerable to SQL injection. The attacker... Read more
- EPSS Score: %5.65
- Published: Jun. 05, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2016-9487
EpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victi... Read more
Affected Products : epubcheck- EPSS Score: %0.13
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2016-9486
On Windows endpoints, the SecureConnector agent must run under the local SYSTEM account or another administrator account in order to enable full functionality of the agent. The typical configuration is for the agent to run as a Windows service under the l... Read more
Affected Products : secureconnector- EPSS Score: %0.28
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2016-9485
On Windows endpoints, the SecureConnector agent must run under the local SYSTEM account or another administrator account in order to enable full functionality of the agent. The typical configuration is for the agent to run as a Windows service under the l... Read more
Affected Products : secureconnector- EPSS Score: %0.16
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2016-9484
The generated PHP form code does not properly validate user input folder directories, allowing a remote unauthenticated attacker to perform a path traversal and access arbitrary files on the server. The PHP FormMail Generator website does not use version ... Read more
Affected Products : php_formmail_generator- EPSS Score: %5.45
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-9483
The PHP form code generated by PHP FormMail Generator deserializes untrusted input as part of the phpfmg_filman_download() function. A remote unauthenticated attacker may be able to use this vulnerability to inject PHP code, or along with CVE-2016-9484 to... Read more
Affected Products : php_formmail_generator- EPSS Score: %0.62
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-9482
Code generated by PHP FormMail Generator may allow a remote unauthenticated user to bypass authentication in the to access the administrator panel by navigating directly to /admin.php?mod=admin&func=panel... Read more
Affected Products : php_formmail_generator- EPSS Score: %9.65
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
10.0
CRITICALCVE-2016-9335
A hard-coded cryptographic key vulnerability was identified in Red Lion Controls Sixnet-Managed Industrial Switches running firmware Version 5.0.196 and Stride-Managed Ethernet Switches running firmware Version 5.0.190. Vulnerable versions of Stride-Manag... Read more
- EPSS Score: %0.24
- Published: May. 09, 2018
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2016-9271
Cloudera Manager 5.7.x before 5.7.6, 5.8.x before 5.8.4, and 5.9.x before 5.9.1 allows XSS in the help search feature.... Read more
Affected Products : cloudera_manager- EPSS Score: %0.34
- Published: Nov. 26, 2019
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2016-9166
NetIQ eDirectory versions prior to 9.0.2, under some circumstances, could be susceptible to downgrade of communication security.... Read more
- EPSS Score: %0.24
- Published: Mar. 21, 2019
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2016-9094
Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU... Read more
Affected Products : endpoint_protection- EPSS Score: %0.30
- Published: Apr. 16, 2018
- Modified: Nov. 21, 2024