Vulnerabilities (CVE)

Filtered by vendor Flexense Subscribe
Total 28 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-29659 1 Flexense 1 Dupscout 2024-11-21 10.0 HIGH 9.8 CRITICAL
A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.
CVE-2018-8065 1 Flexense 1 Syncbreeze 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in the web server in Flexense SyncBreeze Enterprise 10.6.24. There is a user mode write access violation on the syncbrs.exe memory region that can be triggered by rapidly sending a variety of HTTP requests with long HTTP header values or long URIs.
CVE-2018-6537 1 Flexense 1 Syncbreeze 2024-11-21 7.5 HIGH 9.8 CRITICAL
A buffer overflow vulnerability in the control protocol of Flexense SyncBreeze Enterprise v10.4.18 allows remote attackers to execute arbitrary code by sending a crafted packet to TCP port 9121.
CVE-2018-6481 1 Flexense 1 Disksavvy 2024-11-21 7.5 HIGH 9.8 CRITICAL
A buffer overflow vulnerability in the control protocol of Disk Savvy Enterprise v10.4.18 allows remote attackers to execute arbitrary code by sending a crafted packet to TCP port 9124.
CVE-2018-5359 1 Flexense 1 Sysgauge 2024-11-21 9.3 HIGH 8.1 HIGH
The server in Flexense SysGauge 3.6.18 operating on port 9221 can be exploited remotely with the attacker gaining system-level access because of a Buffer Overflow.
CVE-2018-5262 1 Flexense 1 Diskboss 2024-11-21 10.0 HIGH 9.8 CRITICAL
A stack-based buffer overflow in Flexense DiskBoss 8.8.16 and earlier allows unauthenticated remote attackers to execute arbitrary code in the context of a highly privileged account.
CVE-2018-5261 1 Flexense 1 Diskboss 2024-11-21 4.3 MEDIUM 8.1 HIGH
An issue was discovered in Flexense DiskBoss 8.8.16 and earlier. Due to the usage of plaintext information from the handshake as input for the encryption key used for the encryption of the rest of the session, the server and client disclose sensitive information, such as the authentication credentials, to any man-in-the-middle (MiTM) listener.
CVE-2018-10568 1 Flexense 1 Disksorter 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
XSS exists in Flexense DiskSorter Enterprise from v9.5.12 to v10.7.
CVE-2018-10567 1 Flexense 1 Vx Search 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
XSS exists in Flexense VX Search Enterprise from v10.1.12 to v10.7.
CVE-2018-10566 1 Flexense 1 Dupscout 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
XSS exists in Flexense DupScout Enterprise from v10.0.18 to v10.7.
CVE-2018-10565 1 Flexense 1 Disksavvy 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
XSS exists in Flexense DiskSavvy Enterprise from v10.4 to v10.7.
CVE-2018-10564 1 Flexense 1 Diskpulse 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
XSS exists in Flexense DiskPulse Enterprise from v10.4 to v10.7.
CVE-2018-10563 1 Flexense 1 Syncbreeze 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
An XSS in Flexense SyncBreeze affects all versions (tested from SyncBreeze Enterprise from v10.1 to v10.7).
CVE-2018-10294 1 Flexense 1 Diskboss 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Flexense DiskBoss Enterprise v7.4.28 to v9.1.16 has XSS.
CVE-2017-7310 1 Flexense 3 Diskboss, Disksorter, Syncbreeze 2024-11-21 6.8 MEDIUM 7.8 HIGH
A buffer overflow vulnerability in Import Command in SyncBreeze before 10.6, DiskSorter before 10.6, DiskBoss before 8.9, DiskPulse before 10.6, DiskSavvy before 10.6, DupScout before 10.6, and VX Search before 10.6 allows attackers to execute arbitrary code via a crafted XML file containing a long name attribute of a classify element.
CVE-2017-6416 1 Flexense 1 Sysgauge 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in SysGauge 1.5.18. A buffer overflow vulnerability in SMTP connection verification leads to arbitrary code execution. The attack vector is a crafted SMTP daemon that sends a long 220 (aka "Service ready") string.
CVE-2017-17996 1 Flexense 1 Syncbreeze 2024-11-21 9.0 HIGH 8.8 HIGH
A buffer overflow vulnerability in "Add command" functionality exists in Flexense SyncBreeze Enterprise <= 10.3.14. The vulnerability can be triggered by an authenticated attacker who submits more than 5000 characters as the command name. It will cause termination of the SyncBreeze Enterprise server and possibly remote command execution with SYSTEM privilege.
CVE-2017-17099 1 Flexense 1 Syncbreeze 2024-11-21 7.2 HIGH 7.8 HIGH
There exists an unauthenticated SEH based Buffer Overflow vulnerability in the HTTP server of Flexense SyncBreeze Enterprise v10.1.16. When sending a GET request with an excessive length, it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows SYSTEM account.
CVE-2017-17088 1 Flexense 1 Syncbreeze 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Enterprise version of SyncBreeze 10.2.12 and earlier is affected by a Remote Denial of Service vulnerability. The web server does not check bounds when reading server requests in the Host header on making a connection, resulting in a classic Buffer Overflow that causes a Denial of Service.
CVE-2017-15950 1 Flexense 1 Syncbreeze 2024-11-21 6.8 MEDIUM 7.8 HIGH
Flexense SyncBreeze Enterprise version 10.1.16 is vulnerable to a buffer overflow that can be exploited for arbitrary code execution. The flaw is triggered by providing a long input into the "Destination directory" field, either within an XML document or through use of passive mode.