Show filters
183 Total Results
Displaying 11-20 of 183
Sort by:
Attacker Value
Unknown

CVE-2024-43389

Disclosure Date: September 10, 2024 (last updated October 01, 2024)
A low privileged remote attacker can perform configuration changes of the ospf service through OSPF_INTERFACE.SIMPLE_KEY, OSPF_INTERFACE.DIGEST_KEY environment variables which can lead to a DoS.
Attacker Value
Unknown

CVE-2024-43388

Disclosure Date: September 10, 2024 (last updated September 28, 2024)
A low privileged remote attacker with write permissions can reconfigure the SNMP service due to improper input validation.
Attacker Value
Unknown

CVE-2024-43387

Disclosure Date: September 10, 2024 (last updated September 28, 2024)
A low privileged remote attacker can read and write files as root due to improper neutralization of special elements in the variable EMAIL_RELAY_PASSWORD in mGuard devices.
Attacker Value
Unknown

CVE-2024-43386

Disclosure Date: September 10, 2024 (last updated September 28, 2024)
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices.
Attacker Value
Unknown

CVE-2024-43385

Disclosure Date: September 10, 2024 (last updated September 28, 2024)
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable PROXY_HTTP_PORT in mGuard devices.
Attacker Value
Unknown

CVE-2024-7734

Disclosure Date: September 10, 2024 (last updated September 29, 2024)
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.
Attacker Value
Unknown

CVE-2023-6764

Disclosure Date: February 20, 2024 (last updated January 22, 2025)
A format string vulnerability in a function of the IPSec VPN feature in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, and USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1 could allow an attacker to achieve unauthorized remote code execution by sending a sequence of specially crafted payloads containing an invalid pointer; however, such an attack would require detailed knowledge of an affected device’s memory layout and configuration.
0
Attacker Value
Unknown

CVE-2023-6399

Disclosure Date: February 20, 2024 (last updated January 22, 2025)
A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled.
Attacker Value
Unknown

CVE-2023-6398

Disclosure Date: February 20, 2024 (last updated January 22, 2025)
A post-authentication command injection vulnerability in the file upload binary in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1, NWA50AX firmware versions through 6.29(ABYW.3), WAC500 firmware versions through 6.65(ABVS.1), WAX300H firmware versions through 6.60(ACHF.1), and WBE660S firmware versions through 6.65(ACGG.1) could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device via FTP.
0
Attacker Value
Unknown

CVE-2023-46850

Disclosure Date: November 11, 2023 (last updated November 29, 2023)
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.