Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
expedition migration tool vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2020-1977
Insufficient Cross-Site Request Forgery (XSRF) protection on Expedition Migration Tool allows remote unauthenticated malicious users to hijack the authentication of administrators and to perform actions on the Expedition Migration Tool. This issue affects Expedition Migration Too...
Paloaltonetworks Expedition Migration Tool
6.5
CVSSv2
CVE-2019-15694
TigerVNC version before 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code ...
Tigervnc Tigervnc
Opensuse Leap 15.1
2.1
CVSSv2
CVE-2019-15704
A clear text storage of sensitive information vulnerability in FortiClient for Mac may allow a local malicious user to read sensitive information logged in the console window when the user connects to an SSL VPN Gateway.
Fortinet Forticlient
Fortinet Forticlient 6.2.0
5
CVSSv2
CVE-2019-15714
cli/lib/main.js in Entropic prior to 2019-06-13 does not reject / and \ in command names, which might allow a directory traversal attack in unusual situations.
Entropic Project Entropic
3.5
CVSSv2
CVE-2019-1574
Cross-site scripting (XSS) vulnerability in Palo Alto Networks Expedition Migration tool 1.1.12 and previous versions may allow an authenticated malicious user to run arbitrary JavaScript or HTML in the Devices View.
Paloaltonetworks Expedition Migration Tool
3.5
CVSSv2
CVE-2019-1567
The Expedition Migration tool 1.1.6 and previous versions may allow an authenticated malicious user to run arbitrary JavaScript or HTML in the User Mapping Settings.
Paloaltonetworks Expedition Migration Tool
3.5
CVSSv2
CVE-2019-1571
The Expedition Migration tool 1.1.8 and previous versions may allow an authenticated malicious user to run arbitrary JavaScript or HTML in the RADIUS server settings.
Paloaltonetworks Expedition
3.5
CVSSv2
CVE-2019-1569
The Expedition Migration tool 1.1.8 and previous versions may allow an authenticated malicious user to run arbitrary JavaScript or HTML in the User Mapping Settings for account name of admin user.
Paloaltonetworks Expedition
3.5
CVSSv2
CVE-2019-1570
The Expedition Migration tool 1.1.8 and previous versions may allow an authenticated malicious user to run arbitrary JavaScript or HTML in the LDAP server settings.
Paloaltonetworks Expedition
10
CVSSv2
CVE-2018-10143
The Palo Alto Networks Expedition Migration tool 1.0.107 and previous versions may allow an unauthenticated attacker with remote access to run system level commands on the device hosting this service/application.
Paloaltonetworks Expedition 1.0.107
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4040
cross-site scripting
CVE-2023-25790
CVE-2024-2961
XML external entity
CVE-2024-26926
CVE-2024-32806
CVE-2024-32711
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »