Show filters
89 Total Results
Displaying 11-20 of 89
Sort by:
Attacker Value
Unknown
CVE-2024-43386
Disclosure Date: September 10, 2024 (last updated September 28, 2024)
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices.
0
Attacker Value
Unknown
CVE-2024-43385
Disclosure Date: September 10, 2024 (last updated September 28, 2024)
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable PROXY_HTTP_PORT in mGuard devices.
0
Attacker Value
Unknown
CVE-2024-7734
Disclosure Date: September 10, 2024 (last updated September 29, 2024)
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.
0
Attacker Value
Unknown
CVE-2024-23910
Disclosure Date: February 28, 2024 (last updated February 15, 2025)
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
0
Attacker Value
Unknown
CVE-2024-21798
Disclosure Date: February 28, 2024 (last updated February 15, 2025)
ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
0
Attacker Value
Unknown
CVE-2023-46156
Disclosure Date: December 12, 2023 (last updated September 10, 2024)
Affected devices improperly handle specially crafted packets sent to port 102/tcp.
This could allow an attacker to create a denial of service condition. A restart is needed to restore
normal operations.
0
Attacker Value
Unknown
CVE-2023-28831
Disclosure Date: September 12, 2023 (last updated December 10, 2024)
The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation.
This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate.
0
Attacker Value
Unknown
CVE-2023-33469
Disclosure Date: August 09, 2023 (last updated October 08, 2023)
In instances where the screen is visible and remote mouse connection is enabled, KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 can be exploited to achieve local code execution at the root level.
0
Attacker Value
Unknown
CVE-2023-33468
Disclosure Date: August 09, 2023 (last updated October 08, 2023)
KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 exhibit a vulnerability that enables remote manipulation of the device. This vulnerability involves extracting the connection confirmation code remotely, bypassing the need to obtain it directly from the physical screen.
0
Attacker Value
Unknown
CVE-2023-3395
Disclosure Date: July 03, 2023 (last updated November 08, 2023)
All versions of the TWinSoft Configuration Tool store encrypted passwords as plaintext in memory. An attacker with access to system files could open a file to load the document into memory, including sensitive information associated with document, such as password. The attacker could then obtain the plaintext password by using a memory viewer.
0