Lucene search

K

Safe Access Security Vulnerabilities

cve
cve

CVE-2023-2904

The External Visitor Manager portal of HID’s SAFE versions 5.8.0 through 5.11.3 are vulnerable to manipulation within web fields in the application programmable interface (API). An attacker could log in using account credentials available through a request generated by an internal user and then...

7.3CVSS

7.1AI Score

0.0005EPSS

2023-06-07 10:15 PM
15
cve
cve

CVE-2020-27659

Multiple cross-site scripting (XSS) vulnerabilities in Synology SafeAccess before 1.2.3-0234 allow remote attackers to inject arbitrary web script or HTML via the (1) domain or (2) profile...

4.8CVSS

8.1AI Score

0.001EPSS

2020-11-30 10:15 AM
29
cve
cve

CVE-2020-27660

SQL injection vulnerability in request.cgi in Synology SafeAccess before 1.2.3-0234 allows remote attackers to execute arbitrary SQL commands via the domain...

9.8CVSS

9.9AI Score

0.002EPSS

2020-11-30 10:15 AM
35
cve
cve

CVE-2020-8607

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or...

6.7CVSS

7.7AI Score

0.001EPSS

2020-08-05 02:15 PM
16
cve
cve

CVE-2019-1010066

Lawrence Livermore National Laboratory msr-safe v1.1.0 is affected by: Incorrect Access Control. The impact is: An attacker could modify model specific registers. The component is: ioctl handling. The attack vector is: An attacker could exploit a bug in ioctl interface whitelist checking, in order....

7.5CVSS

7.4AI Score

0.001EPSS

2019-07-18 02:15 PM
19
cve
cve

CVE-2017-16088

The safe-eval module describes itself as a safer version of eval. By accessing the object constructors, un-sanitized user input can access the entire standard library and effectively break out of the...

10CVSS

9.4AI Score

0.003EPSS

2018-06-07 02:29 AM
58
1
cve
cve

CVE-2010-1168

The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by.....

6.7AI Score

0.019EPSS

2010-06-21 04:30 PM
40