Show filters
285,610 Total Results
Displaying 1-10 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2023-49694

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
A low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user can then execute the JSP files under the security context of SYSTEM.
0
Attacker Value
Unknown

CVE-2023-49693

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
NETGEAR ProSAFE Network Management System has Java Debug Wire Protocol (JDWP) listening on port 11611 and it is remotely accessible by unauthenticated users, allowing attackers to execute arbitrary code.
0
Attacker Value
Unknown

CVE-2023-40458

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Sierra Wireless, Inc ALEOS could potentially allow a remote attacker to trigger a Denial of Service (DoS) condition for ACEManager without impairing other router functions. This condition is cleared by restarting the device.
0
Attacker Value
Unknown

CVE-2022-42541

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Remote code execution
0
Attacker Value
Unknown

CVE-2022-42540

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Elevation of privilege
0
Attacker Value
Unknown

CVE-2022-42539

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Information disclosure
0
Attacker Value
Unknown

CVE-2022-42538

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Elevation of privilege
0
Attacker Value
Unknown

CVE-2022-42537

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Remote code execution
0
Attacker Value
Unknown

CVE-2022-42536

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Remote code execution
0
Attacker Value
Unknown

CVE-2023-49091

Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. Cosmos-server is vulnerable due to to the authorization header used for user login remaining valid and not expiring after log out. This vulnerability allows an attacker to use the token to gain unauthorized access to the application/system even after the user has logged out. This issue has been patched in version 0.13.0.
0