Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ins vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2009-0387
Array index error in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 up to and including 0.10.11 allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code...
Gstreamer Good Plug-ins 0.10.10
Gstreamer Good Plug-ins 0.10.11
Gstreamer Good Plug-ins 0.10.9
Gstreamer Plug-ins 0.8.5
9.3
CVSSv2
CVE-2009-0397
Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 up to and including 0.10.11, and GStreamer Plug-ins (aka gstreamer-plugins) 0.8.5, might allow remote malicious users to execute arbi...
Gstreamer Plug-ins 0.8.5
Gstreamer Good Plug-ins 0.10.10
Gstreamer Good Plug-ins 0.10.9
Gstreamer Good Plug-ins 0.10.11
9.3
CVSSv2
CVE-2009-0386
Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 up to and including 0.10.11 might allow remote malicious users to execute arbitrary code via crafted Composition Time To Sample (ctts...
Gstreamer Good Plug-ins 0.10.11
Gstreamer Good Plug-ins 0.10.9
Gstreamer Good Plug-ins 0.10.10
NA
CVE-2022-45093
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product as well as with access to the SFTP server of the affected product (22/tcp), could pot...
Siemens Sinec Ins 1.0
Siemens Sinec Ins
NA
CVE-2022-45094
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially inject commands into the dhcpd configuration of the affected produ...
Siemens Sinec Ins 1.0
Siemens Sinec Ins
NA
CVE-2022-45092
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially read and write arbitrary files from and to the device's file ...
Siemens Sinec Ins 1.0
Siemens Sinec Ins
NA
CVE-2023-48427
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). Affected products do not properly validate the certificate of the configured UMC server. This could allow an malicious user to intercept credentials that are sent to the UMC server as well as ...
Siemens Sinec Ins 1.0
Siemens Sinec Ins
NA
CVE-2023-48428
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The radius configuration mechanism of affected products does not correctly check uploaded certificates. A malicious admin could upload a crafted certificate resulting in a denial-of-service co...
Siemens Sinec Ins 1.0
Siemens Sinec Ins
NA
CVE-2023-48429
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The Web UI of affected devices does not check the length of parameters in certain conditions. This allows a malicious admin to crash the server by sending a crafted request to the server. The ...
Siemens Sinec Ins 1.0
Siemens Sinec Ins
NA
CVE-2023-48430
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The REST API of affected devices does not check the length of parameters in certain conditions. This allows a malicious admin to crash the server by sending a crafted request to the API. The s...
Siemens Sinec Ins 1.0
Siemens Sinec Ins
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »