Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown
CVE-2023-36853
Disclosure Date: July 19, 2023 (last updated November 08, 2023)
In Keysight Geolocation Server v2.4.2 and prior, a low privileged attacker could create a local ZIP file containing a malicious script in any location. The attacker could abuse this to load a DLL with SYSTEM privileges.
0
Attacker Value
Unknown
CVE-2023-34394
Disclosure Date: July 19, 2023 (last updated October 08, 2023)
In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition.
0
Attacker Value
Unknown
CVE-2023-1967
Disclosure Date: April 27, 2023 (last updated October 08, 2023)
Keysight N8844A Data Analytics Web Service deserializes untrusted data without sufficiently verifying the resulting data will be valid.
0
Attacker Value
Unknown
CVE-2023-1860
Disclosure Date: April 05, 2023 (last updated October 08, 2023)
A vulnerability was found in Keysight IXIA Hawkeye 3.3.16.28. It has been declared as problematic. This vulnerability affects unknown code of the file /licenses. The manipulation of the argument view with the input teste"><script>alert(%27c4ng4c3ir0%27)</script> leads to cross site scripting. The attack can be initiated remotely. VDB-224998 is the identifier assigned to this vulnerability. NOTE: Vendor did not respond if and how they may handle this issue.
0
Attacker Value
Unknown
CVE-2023-1399
Disclosure Date: March 27, 2023 (last updated November 08, 2023)
N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected device’s default configuration and achieve remote code execution.
0
Attacker Value
Unknown
CVE-2022-38130
Disclosure Date: August 10, 2022 (last updated October 08, 2023)
The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<attacker-host>\sms\<attacker-db.zip>), effectively controlling the content of the database to be restored.
0
Attacker Value
Unknown
CVE-2022-38129
Disclosure Date: August 10, 2022 (last updated October 08, 2023)
A path traversal vulnerability exists in the com.keysight.tentacle.licensing.LicenseManager.addLicenseFile() method in the Keysight Sensor Management Server (SMS). This allows an unauthenticated remote attacker to upload arbitrary files to the SMS host.
0
Attacker Value
Unknown
CVE-2022-1661
Disclosure Date: May 26, 2022 (last updated October 07, 2023)
The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files.
0
Attacker Value
Unknown
CVE-2022-1660
Disclosure Date: May 26, 2022 (last updated October 07, 2023)
The affected products are vulnerable of untrusted data due to deserialization without prior authorization/authentication, which may allow an attacker to remotely execute arbitrary code.
0
Attacker Value
Unknown
CVE-2020-35121
Disclosure Date: December 15, 2020 (last updated November 28, 2024)
An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could insert arbitrary JavaScript into saved macro parameters that would execute when a user viewed a page with that instance of the macro.
0