cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-5748,https://securityvulnerability.io/vulnerability/CVE-2023-5748,Buffer Overflow Issue in Synology SSL VPN Client,"A buffer overflow vulnerability exists in the cgi component of Synology's SSL VPN Client prior to version 1.4.7-0687. This flaw allows local users to leverage unspecified vectors to execute denial-of-service attacks, potentially causing the application to crash or behave unpredictably. Users of affected versions are encouraged to upgrade to the latest version to mitigate potential risks.",Synology,Synology SSL VPN Client,5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-11-07T04:24:00.000Z,0 CVE-2018-13283,https://securityvulnerability.io/vulnerability/CVE-2018-13283,,"Lack of administrator control over security vulnerability in client.cgi in Synology SSL VPN Client before 1.2.5-0226 allows remote attackers to conduct man-in-the-middle attacks via the (1) command, (2) hostname, or (3) port parameter.",Synology,Ssl Vpn Client,8.8,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2019-04-01T15:29:00.000Z,0 CVE-2018-8929,https://securityvulnerability.io/vulnerability/CVE-2018-8929,,Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload.,Synology,Ssl Vpn Client,7.3,HIGH,0.0010600000387057662,false,,false,false,false,,,false,false,,2018-07-06T00:00:00.000Z,0