Vulnerabilities (CVE)

Total 316927 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-0534 1 Arsenol Project 1 Arsenol 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Cross-site scripting vulnerability in ArsenoL Version 0.5 allows an attacker to inject arbitrary web script or HTML via unspecified vectors.
CVE-2018-0533 1 Cybozu 1 Garoon 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
Cybozu Garoon 3.0.0 to 4.2.6 allows remote authenticated attackers to bypass access restriction to alter setting data of session authentication via unspecified vectors.
CVE-2018-0532 1 Cybozu 1 Garoon 2024-11-21 4.0 MEDIUM 2.7 LOW
Cybozu Garoon 3.0.0 to 4.2.6 allows remote authenticated attackers to bypass access restriction to alter setting data of the Standard database via unspecified vectors.
CVE-2018-0531 1 Cybozu 1 Garoon 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Cybozu Garoon 3.0.0 to 4.2.6 allows remote authenticated attackers to bypass access restriction to view or alter an access privilege of a folder and/or notification settings via unspecified vectors.
CVE-2018-0530 1 Cybozu 1 Garoon 2024-11-21 6.5 MEDIUM 8.8 HIGH
SQL injection vulnerability in the Cybozu Garoon 3.5.0 to 4.2.6 allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors.
CVE-2018-0529 1 Cybozu 1 Office 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
Cybozu Office 10.0.0 to 10.7.0 allows remote attackers to cause a denial of service via unspecified vectors.
CVE-2018-0528 1 Cybozu 1 Office 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Cybozu Office 10.0.0 to 10.7.0 allows authenticated attackers to bypass authentication to view the schedules that are not permitted to access via unspecified vectors.
CVE-2018-0527 1 Cybozu 1 Office 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Cross-site scripting vulnerability in Cybozu Office 10.0.0 to 10.7.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2018-0526 1 Cybozu 1 Office 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
Cybozu Office 10.0.0 to 10.7.0 allow remote attackers to display an image located in an external server via unspecified vectors.
CVE-2018-0525 1 Jubat 1 Jubatus 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Directory traversal vulnerability in Jubatus 1.0.2 and earlier allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2018-0524 1 Jubat 1 Jubatus 2024-11-21 7.5 HIGH 7.3 HIGH
Jubatus 1.0.2 and earlier allows remote code execution via unspecified vectors.
CVE-2018-0523 1 Buffalo 2 Wxr-1900dhp2, Wxr-1900dhp2 Firmware 2024-11-21 8.3 HIGH 8.8 HIGH
Buffalo WXR-1900DHP2 firmware Ver.2.48 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors.
CVE-2018-0522 1 Buffalo 2 Wxr-1900dhp2, Wxr-1900dhp2 Firmware 2024-11-21 6.8 MEDIUM 7.8 HIGH
Buffer overflow in Buffalo WXR-1900DHP2 firmware Ver.2.48 and earlier allows an attacker to execute arbitrary code via a specially crafted file.
CVE-2018-0521 1 Buffalo 2 Wxr-1900dhp2, Wxr-1900dhp2 Firmware 2024-11-21 8.3 HIGH 8.8 HIGH
Buffalo WXR-1900DHP2 firmware Ver.2.48 and earlier allows an attacker to bypass authentication and execute arbitrary commands on the device via unspecified vectors.
CVE-2018-0520 1 Fsi 2 Fs010w, Fs010w Firmware 2024-11-21 6.8 MEDIUM 8.8 HIGH
Cross-site request forgery (CSRF) vulnerability in FS010W firmware FS010W_00_V1.3.0 and earlier allows an attacker to hijack the authentication of administrators via unspecified vectors.
CVE-2018-0519 1 Fsi 2 Fs010w, Fs010w Firmware 2024-11-21 3.5 LOW 4.8 MEDIUM
Cross-site scripting vulnerability in FS010W firmware FS010W_00_V1.3.0 and earlier allows an attacker to inject arbitrary web script or HTML via unspecified vectors.
CVE-2018-0518 1 Linecorp 1 Line 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
LINE for iOS version 7.1.3 to 7.1.5 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
CVE-2018-0517 1 Kddi 1 Anshin Net Security 2024-11-21 6.8 MEDIUM 7.8 HIGH
Untrusted search path vulnerability in Anshin net security for Windows Version 16.0.1.44 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2018-0516 1 Flets 1 Address Selection Tool 2024-11-21 6.8 MEDIUM 7.8 HIGH
Untrusted search path vulnerability in FLET'S v4 / v6 address selection tool allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2018-0515 1 Flets 1 Azukeru Backup Tool 2024-11-21 6.8 MEDIUM 7.8 HIGH
Untrusted search path vulnerability in "FLET'S Azukeru Backup Tool" version 1.5.2.6 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.