Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
inspector vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2019-10781
In schema-inspector prior to 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.
Schema-inspector Project Schema-inspector
4.3
CVSSv2
CVE-2015-2872
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro Deep Discovery Inspector (DDI) on Deep Discovery Threat appliances with software prior to 3.5.1477, 3.6.x prior to 3.6.1217, 3.7.x prior to 3.7.1248, 3.8.x prior to 3.8.1263, and other versions allow remote malici...
Trendmicro Deep Discovery Inspector 3.5
Trendmicro Deep Discovery Inspector 3.6
Trendmicro Deep Discovery Inspector 3.7
Trendmicro Deep Discovery Inspector 3.8
5.5
CVSSv2
CVE-2015-2873
Trend Micro Deep Discovery Inspector (DDI) on Deep Discovery Threat appliances with software prior to 3.5.1477, 3.6.x prior to 3.6.1217, 3.7.x prior to 3.7.1248, 3.8.x prior to 3.8.1263, and other versions allows remote malicious users to obtain sensitive information or change th...
Trendmicro Deep Discovery Inspector 3.5
Trendmicro Deep Discovery Inspector 3.6
Trendmicro Deep Discovery Inspector 3.7
Trendmicro Deep Discovery Inspector 3.8
9
CVSSv2
CVE-2016-5840
hotfix_upload.cgi in Trend Micro Deep Discovery Inspector (DDI) 3.7, 3.8 SP1 (3.81), and 3.8 SP2 (3.82) allows remote administrators to execute arbitrary code via shell metacharacters in the filename parameter of the Content-Disposition header.
Trend Micro Deep Discovery Inspector 3.7
Trend Micro Deep Discovery Inspector 3.82
Trend Micro Deep Discovery Inspector 3.81
1 EDB exploit
5
CVSSv2
CVE-2021-21267
Schema-Inspector is an open-source tool to sanitize and validate JS objects (npm package schema-inspector). In before version 2.0.0, email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...
Schema-inspector Project Schema-inspector
Netapp Oncommand Insight -
Netapp E-series Performance Analyzer -
9
CVSSv2
CVE-2019-15014
A command injection vulnerability exists in the Zingbox Inspector versions 1.286 and previous versions, that allows for an authenticated user to execute arbitrary system commands in the CLI.
Zingbox Inspector
7.2
CVSSv2
CVE-2019-15015
In the Zingbox Inspector, versions 1.294 and previous versions, hardcoded credentials for root and inspector user accounts are present in the system software, which can result in unauthorized users gaining access to the system.
Zingbox Inspector
6.5
CVSSv2
CVE-2019-15016
An SQL injection vulnerability exists in the management interface of Zingbox Inspector versions 1.288 and previous versions, that allows for unsanitized data provided by an authenticated user to be passed from the web UI into the database.
Zingbox Inspector
7.2
CVSSv2
CVE-2019-15017
The SSH service is enabled on the Zingbox Inspector versions 1.294 and previous versions, exposing SSH to the local network. When combined with PAN-SA-2019-0027, this can allow an malicious user to authenticate to the service using hardcoded credentials.
Zingbox Inspector
5
CVSSv2
CVE-2019-15018
A security vulnerability exists in the Zingbox Inspector versions 1.280 and previous versions, where authentication is not required when binding the Inspector instance to a different customer tenant.
Zingbox Inspector
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27977
IMAP
local users
CVE-2024-32038
CVE-2023-49963
CVE-2023-22869
CVE-2024-31497
local
CVE-2024-2961
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »