Filtered by vendor Flexense Subscriptions
Total 28 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2018-10294 1 Flexense 1 Diskboss 2024-08-05 N/A
Flexense DiskBoss Enterprise v7.4.28 to v9.1.16 has XSS.
CVE-2018-8065 1 Flexense 1 Syncbreeze 2024-08-05 N/A
An issue was discovered in the web server in Flexense SyncBreeze Enterprise 10.6.24. There is a user mode write access violation on the syncbrs.exe memory region that can be triggered by rapidly sending a variety of HTTP requests with long HTTP header values or long URIs.
CVE-2018-6537 1 Flexense 1 Syncbreeze 2024-08-05 N/A
A buffer overflow vulnerability in the control protocol of Flexense SyncBreeze Enterprise v10.4.18 allows remote attackers to execute arbitrary code by sending a crafted packet to TCP port 9121.
CVE-2018-6481 1 Flexense 1 Disksavvy 2024-08-05 9.8 Critical
A buffer overflow vulnerability in the control protocol of Disk Savvy Enterprise v10.4.18 allows remote attackers to execute arbitrary code by sending a crafted packet to TCP port 9124.
CVE-2018-5359 1 Flexense 1 Sysgauge 2024-08-05 N/A
The server in Flexense SysGauge 3.6.18 operating on port 9221 can be exploited remotely with the attacker gaining system-level access because of a Buffer Overflow.
CVE-2018-5262 1 Flexense 1 Diskboss 2024-08-05 N/A
A stack-based buffer overflow in Flexense DiskBoss 8.8.16 and earlier allows unauthenticated remote attackers to execute arbitrary code in the context of a highly privileged account.
CVE-2018-5261 1 Flexense 1 Diskboss 2024-08-05 N/A
An issue was discovered in Flexense DiskBoss 8.8.16 and earlier. Due to the usage of plaintext information from the handshake as input for the encryption key used for the encryption of the rest of the session, the server and client disclose sensitive information, such as the authentication credentials, to any man-in-the-middle (MiTM) listener.
CVE-2020-29659 1 Flexense 1 Dupscout 2024-08-04 9.8 Critical
A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.