CVE-2023-49574
- EPSS 0.11%
- Veröffentlicht 24.05.2024 13:15:09
- Zuletzt bearbeitet 04.03.2025 17:00:22
A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14 that could allow an attacker to execute persistent XSS through /add_job in job_name. This vulnerability could allow an attacker to store malicious JavaScript payloa...
CVE-2023-49575
- EPSS 0.11%
- Veröffentlicht 24.05.2024 13:15:09
- Zuletzt bearbeitet 21.05.2025 12:16:13
A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14, in Sync Breeze Enterprise Server 10.4.18 version, and in Disk Pulse Enterprise 10.4.18 version, that could allow an attacker to execute persistent XSS through /set...
CVE-2023-49572
- EPSS 0.11%
- Veröffentlicht 24.05.2024 13:15:08
- Zuletzt bearbeitet 21.05.2025 12:16:12
A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14, and in Disk Pulse Enterprise 10.4.18 version, that could allow an attacker to execute persistent XSS through /setup_odbc in odbc_data_source, odbc_user and odbc_pa...
CVE-2023-49573
- EPSS 0.11%
- Veröffentlicht 24.05.2024 13:15:08
- Zuletzt bearbeitet 04.03.2025 17:00:22
A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14 that could allow an attacker to execute persistent XSS through /add_command_action in action_value. This vulnerability could allow an attacker to store malicious Ja...
CVE-2018-10567
- EPSS 0.24%
- Veröffentlicht 02.05.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:41:34
XSS exists in Flexense VX Search Enterprise from v10.1.12 to v10.7.
CVE-2017-15662
- EPSS 13.76%
- Veröffentlicht 10.01.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:14:58
In Flexense VX Search Enterprise v10.1.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9123.
CVE-2017-15220
- EPSS 12.38%
- Veröffentlicht 11.10.2017 13:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Flexense VX Search Enterprise 10.1.12 is vulnerable to a buffer overflow via an empty POST request to a long URI beginning with a /../ substring. This allows remote attackers to execute arbitrary code.