Search Results (Refine Search)
- Keyword (text search): cpe:2.3:a:keysight:sensor_management_server:2.4.0:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-38130 |
The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<attacker-host>\sms\<attacker-db.zip>), effectively controlling the content of the database to be restored. Published: August 10, 2022; 4:16:06 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2022-38129 |
A path traversal vulnerability exists in the com.keysight.tentacle.licensing.LicenseManager.addLicenseFile() method in the Keysight Sensor Management Server (SMS). This allows an unauthenticated remote attacker to upload arbitrary files to the SMS host. Published: August 10, 2022; 4:16:06 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |