Latest CVE Feed
-
7.5
HIGHCVE-2015-2959
Zoho NetFlow Analyzer build 10250 and earlier does not check for administrative authorization, which allows remote attackers to obtain sensitive information, modify passwords, or remove accounts by leveraging the guest role.... Read more
- EPSS Score: %0.82
- Published: Jun. 09, 2015
- Modified: Apr. 12, 2025
-
7.7
HIGHCVE-2014-9284
The Buffalo WHR-1166DHP 1.60 and earlier, WSR-600DHP 1.60 and earlier, WHR-600D 1.60 and earlier, WHR-300HP2 1.60 and earlier, WMR-300 1.60 and earlier, WEX-300 1.60 and earlier, and BHR-4GRV2 1.04 and earlier routers allow remote authenticated users to e... Read more
Affected Products : wsr-600dhp_firmware whr-300hp2_firmware whr-1166dhp_firmware bhr-4grv2_firmware wmr-300_firmware wex-300_firmware whr-600d_firmware wsr-600dhp whr-300hp2 whr-1166dhp +4 more products- EPSS Score: %0.72
- Published: Jun. 09, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-4053
The admin command in ceph-deploy before 1.5.25 uses world-readable permissions for /etc/ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.... Read more
Affected Products : ceph-deploy- EPSS Score: %0.05
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
9.0
HIGHCVE-2015-4051
Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which allows remote attackers to cause a denial of service (reboot or shutdown), create arbitrary users, or possibly have unspecified other impact via a crafted... Read more
Affected Products : ipc_diagnostics- EPSS Score: %1.21
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
7.5
HIGHCVE-2015-3905
Buffer overflow in the set_cs_start function in t1disasm.c in t1utils before 1.39 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.... Read more
- EPSS Score: %4.72
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-3201
Thermostat before 2.0.0 uses world-readable permissions for the web.xml configuration file, which allows local users to obtain user credentials by reading the file.... Read more
Affected Products : thermostat- EPSS Score: %0.05
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-3001
SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.... Read more
Affected Products : sysaid- EPSS Score: %13.71
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
7.8
HIGHCVE-2015-3000
SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, aka an... Read more
Affected Products : sysaid- EPSS Score: %20.10
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
6.5
MEDIUMCVE-2015-2999
Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministrat... Read more
Affected Products : sysaid- EPSS Score: %1.02
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-2998
SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml.... Read more
Affected Products : sysaid- EPSS Score: %62.16
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-2997
SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an err... Read more
Affected Products : sysaid- EPSS Score: %68.13
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
8.5
HIGHCVE-2015-2996
Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption)... Read more
Affected Products : sysaid- EPSS Score: %91.90
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2015-2995
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.... Read more
Affected Products : sysaid- EPSS Score: %79.20
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
6.5
MEDIUMCVE-2015-2994
Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_ph... Read more
Affected Products : sysaid- EPSS Score: %76.86
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
7.5
HIGHCVE-2015-2993
SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName paramet... Read more
Affected Products : sysaid- EPSS Score: %77.00
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
7.5
HIGHCVE-2014-6284
SAP Adaptive Server Enterprise (ASE) before 15.7 SP132 and 16.0 before 16.0 SP01 allows remote attackers to bypass the challenge and response mechanism and obtain access to the probe account via a crafted response, aka SAP Security Note 2113995.... Read more
- EPSS Score: %0.25
- Published: Jun. 08, 2015
- Modified: Apr. 12, 2025
-
8.5
HIGHCVE-2015-4004
The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system cra... Read more
- EPSS Score: %4.97
- Published: Jun. 07, 2015
- Modified: Apr. 12, 2025
-
7.8
HIGHCVE-2015-4003
The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via a crafted packet.... Read more
Affected Products : linux_kernel- EPSS Score: %1.47
- Published: Jun. 07, 2015
- Modified: Apr. 12, 2025
-
9.0
HIGHCVE-2015-4002
drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibl... Read more
- EPSS Score: %3.36
- Published: Jun. 07, 2015
- Modified: Apr. 12, 2025
-
9.0
HIGHCVE-2015-4001
Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code vi... Read more
Affected Products : linux_kernel- EPSS Score: %5.91
- Published: Jun. 07, 2015
- Modified: Apr. 12, 2025