Vulnerabilities > Zingbox > Inspector > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-10-09 | CVE-2019-15023 | Cleartext Storage of Sensitive Information vulnerability in Zingbox Inspector A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that results in passwords for 3rd party integrations being stored in cleartext in device configuration. | 7.5 |
2019-10-09 | CVE-2019-15022 | Authentication Bypass by Spoofing vulnerability in Zingbox Inspector A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that allows for the Inspector to be susceptible to ARP spoofing. | 7.5 |
2019-10-09 | CVE-2019-15018 | Missing Authentication for Critical Function vulnerability in Zingbox Inspector 1.280 A security vulnerability exists in the Zingbox Inspector versions 1.280 and earlier, where authentication is not required when binding the Inspector instance to a different customer tenant. | 7.5 |
2019-10-09 | CVE-2019-15017 | Use of Hard-coded Credentials vulnerability in Zingbox Inspector The SSH service is enabled on the Zingbox Inspector versions 1.294 and earlier, exposing SSH to the local network. | 8.4 |
2019-10-09 | CVE-2019-15016 | SQL Injection vulnerability in Zingbox Inspector An SQL injection vulnerability exists in the management interface of Zingbox Inspector versions 1.288 and earlier, that allows for unsanitized data provided by an authenticated user to be passed from the web UI into the database. | 8.8 |
2019-10-09 | CVE-2019-15015 | Use of Hard-coded Credentials vulnerability in Zingbox Inspector In the Zingbox Inspector, versions 1.294 and earlier, hardcoded credentials for root and inspector user accounts are present in the system software, which can result in unauthorized users gaining access to the system. | 8.4 |
2019-10-09 | CVE-2019-15014 | OS Command Injection vulnerability in Zingbox Inspector 1.280/1.281/1.286 A command injection vulnerability exists in the Zingbox Inspector versions 1.286 and earlier, that allows for an authenticated user to execute arbitrary system commands in the CLI. | 8.8 |