Show filters
285,610 Total Results
Displaying 1-10 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown
CVE-2023-49694
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
A low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user can then execute the JSP files under the security context of SYSTEM.
0
Attacker Value
Unknown
CVE-2023-49693
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
NETGEAR ProSAFE Network Management System has Java Debug Wire Protocol (JDWP) listening on port 11611 and it is remotely accessible by unauthenticated users, allowing attackers to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2023-40458
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Sierra Wireless, Inc ALEOS could potentially allow a remote attacker to trigger a
Denial of Service (DoS) condition for ACEManager without impairing
other router functions. This condition is cleared by restarting the
device.
0
Attacker Value
Unknown
CVE-2022-42541
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Remote code execution
0
Attacker Value
Unknown
CVE-2022-42540
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Elevation of privilege
0
Attacker Value
Unknown
CVE-2022-42539
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Information disclosure
0
Attacker Value
Unknown
CVE-2022-42538
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Elevation of privilege
0
Attacker Value
Unknown
CVE-2022-42537
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Remote code execution
0
Attacker Value
Unknown
CVE-2022-42536
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Remote code execution
0
Attacker Value
Unknown
CVE-2023-49091
Disclosure Date: November 29, 2023 (last updated November 30, 2023)
Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. Cosmos-server is vulnerable due to to the authorization header used for user login remaining valid and not expiring after log out. This vulnerability allows an attacker to use the token to gain unauthorized access to the application/system even after the user has logged out. This issue has been patched in version 0.13.0.
0