Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
system studio vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2021-33064
Uncontrolled search path in the software installer for Intel(R) System Studio for all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel System Studio
4.3
CVSSv2
CVE-2011-4193
Cross-site scripting (XSS) vulnerability in the overlay files tab in SUSE Studio Onsite 1.2 prior to 1.2.1 and SUSE Studio Extension for System z 1.2 prior to 1.2.1 allows remote malicious users to inject arbitrary web script or HTML via a crafted application, related to cloning.
Suse Studio Onsite 1.2
Suse Studio Extension For System Z 1.2
10
CVSSv2
CVE-2013-3712
SUSE Studio Onsite 1.3.x prior to 1.3.6 and SUSE Studio Extension for System z 1.3 uses "static" secret tokens, which has unspecified impact and vectors.
Suse Studio Onsite 1.3
Suse Studio Onsite 1.3.1
Suse Studio Onsite 1.3.3
Suse Studio Onsite 1.3.5
Suse Studio Onsite 1.3.2
Suse Studio Onsite 1.3.4
Suse Studio Extension For System Z 1.3
7.5
CVSSv2
CVE-2011-4195
kiwi prior to 4.98.05, as used in SUSE Studio Onsite 1.2 prior to 1.2.1 and SUSE Studio Extension for System z 1.2 prior to 1.2.1, allows malicious users to execute arbitrary commands via shell metacharacters in an image name.
Suse Studio Extension For System Z 1.2
Suse Kiwi
Suse Studio Onsite 1.2
7.5
CVSSv2
CVE-2011-3180
kiwi prior to 4.98.08, as used in SUSE Studio Onsite 1.2 prior to 1.2.1 and SUSE Studio Extension for System z 1.2 prior to 1.2.1, allows malicious users to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.
Suse Kiwi
Suse Studio Onsite 1.2
Suse Studio Extension For System Z 1.2
7.5
CVSSv2
CVE-2011-4192
kiwi prior to 4.85.1, as used in SUSE Studio Onsite 1.2 prior to 1.2.1 and SUSE Studio Extension for System z 1.2 prior to 1.2.1, allows malicious users to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."
Suse Kiwi
Suse Studio Extension For System Z 1.2
Suse Studio Onsite 1.2
NA
CVE-2022-43483
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not properly validate the input module name to the monitor services of the software. This could allow a remote malicious user to access sensitive functions of the applicatio...
Sewio Real-time Location System Studio
NA
CVE-2022-41989
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not validate the length of RTLS report payloads during communication. This allows an malicious user to send an exceedingly long payload, resulting in an out-of-bounds write ...
Sewio Real-time Location System Studio
NA
CVE-2022-45127
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to cross-site request forgery in its backup services. An attacker could take advantage of this vulnerability to execute arbitrary backup operations and cause a deni...
Sewio Real-time Location System Studio
NA
CVE-2022-45444
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 contains hard-coded passwords for select users in the application’s database. This could allow a remote malicious user to login to the database with unrestricted access.
Sewio Real-time Location System Studio
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
injection
CVE-2024-30983
CVE-2023-4235
CVE-2024-21338
privilege
encryption
CVE-2023-4232
CVE-2024-31497
CVE-2024-32341
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »