Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-45506 | 1 Tenda | 2 W30e, W30e Firmware | 2022-12-09 | N/A | 9.8 CRITICAL |
Tenda W30E v1.0.1.25(633) was discovered to contain a command injection vulnerability via the fileNameMit parameter at /goform/delFileName. | |||||
CVE-2022-45503 | 1 Tenda | 2 W6-s, W6-s Firmware | 2022-12-09 | N/A | 7.5 HIGH |
Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the linkEn parameter at /goform/setAutoPing. | |||||
CVE-2022-45501 | 1 Tenda | 2 W6-s, W6-s Firmware | 2022-12-09 | N/A | 7.5 HIGH |
Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the wl_radio parameter at /goform/wifiSSIDset. | |||||
CVE-2022-45497 | 1 Tenda | 2 W6-s, W6-s Firmware | 2022-12-09 | N/A | 9.8 CRITICAL |
Tenda W6-S v1.0.0.4(510) was discovered to contain a command injection vulnerability in the tpi_get_ping_output function at /goform/exeCommand. | |||||
CVE-2022-41735 | 1 Ibm | 1 Business Automation Workflow | 2022-12-09 | N/A | 6.1 MEDIUM |
IBM Business Process Manager 21.0.1 through 21.0.3.1, 20.0.0.1 through 20.0.0.2 19.0.0.1 through 19.0.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 65687. | |||||
CVE-2017-14475 | 1 Mysql-mmm | 1 Mysql Multi-master Replication Manager | 2022-12-08 | 10.0 HIGH | 9.8 CRITICAL |
In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Linux), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. | |||||
CVE-2017-14476 | 1 Mysql-mmm | 1 Mysql Multi-master Replication Manager | 2022-12-08 | 10.0 HIGH | 9.8 CRITICAL |
In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. | |||||
CVE-2017-14474 | 1 Mysql-mmm | 1 Mysql Multi-master Replication Manager | 2022-12-08 | 10.0 HIGH | 9.8 CRITICAL |
In the MMM::Agent::Helpers::_execute function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1, a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. | |||||
CVE-2017-14477 | 1 Mysql-mmm | 1 Mysql Multi-master Replication Manager | 2022-12-08 | 10.0 HIGH | 9.8 CRITICAL |
In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for FreeBSD), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. | |||||
CVE-2017-14478 | 1 Mysql-mmm | 1 Mysql Multi-master Replication Manager | 2022-12-08 | 10.0 HIGH | 9.8 CRITICAL |
In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Linux), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. | |||||
CVE-2017-14479 | 1 Mysql-mmm | 1 Mysql Multi-master Replication Manager | 2022-12-08 | 10.0 HIGH | 9.8 CRITICAL |
In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. | |||||
CVE-2017-16252 | 1 Insteon | 2 Hub 2245-222, Hub Firmware | 2022-12-08 | 5.5 MEDIUM | 8.1 HIGH |
Specially crafted commands sent through the PubNub service in Insteon Hub 2245-222 with firmware version 1012 can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability.At 0x9d014cc0 the value for the cmd key is copied using strcpy to the buffer at $sp+0x11c. This buffer is 20 bytes large, sending anything longer will cause a buffer overflow. | |||||
CVE-2017-14480 | 1 Mysql-mmm | 1 Mysql Multi-master Replication Manager | 2022-12-08 | 10.0 HIGH | 9.8 CRITICAL |
In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for FreeBSD), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. | |||||
CVE-2017-16253 | 1 Insteon | 2 Hub, Hub Firmware | 2022-12-08 | 5.5 MEDIUM | 8.1 HIGH |
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012 for the cc channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request At 0x9d014dd8 the value for the id key is copied using strcpy to the buffer at $sp+0x290. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | |||||
CVE-2017-16254 | 1 Insteon | 2 Hub, Hub Firmware | 2022-12-08 | 5.5 MEDIUM | 8.1 HIGH |
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request at 0x9d014e4c the value for the flg key is copied using strcpy to the buffer at $sp+0x270. This buffer is 16 bytes large, sending anything longer will cause a buffer overflow. | |||||
CVE-2017-16255 | 1 Insteon | 2 Hub, Hub Firmware | 2022-12-08 | 5.5 MEDIUM | 8.1 HIGH |
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request at At 0x9d014e84 the value for the cmd1 key is copied using strcpy to the buffer at $sp+0x280. This buffer is 16 bytes large. | |||||
CVE-2017-16337 | 1 Insteon | 2 Hub 2245-222, Hub 2245-222 Firmware | 2022-12-08 | 9.0 HIGH | 8.8 HIGH |
On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. At 0x9d01ef24 the value for the s_offset key is copied using strcpy to the buffer at $sp+0x2b0. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | |||||
CVE-2017-16338 | 1 Insteon | 2 Hub, Hub Firmware | 2022-12-08 | 8.0 HIGH | 9.9 CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01bad0 the value for the host key is copied using strcpy to the buffer at 0xa00016e0. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | |||||
CVE-2017-16339 | 1 Insteon | 2 Hub, Hub Firmware | 2022-12-08 | 8.0 HIGH | 9.9 CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01bb1c the value for the uri key is copied using strcpy to the buffer at 0xa00016a0. This buffer is 64 bytes large, sending anything longer will cause a buffer overflow. | |||||
CVE-2017-16341 | 1 Insteon | 2 Hub, Hub Firmware | 2022-12-08 | 8.0 HIGH | 9.9 CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c224 the value for the s_vol_play key is copied using strcpy to the buffer at 0xa0000418. This buffer is maximum 8 bytes large (this is the maximum size it could be, it is possible other global variables are stored between this variable and the next one that we could identify), sending anything longer will cause a buffer overflow. |