Show filters
21 Total Results
Displaying 11-20 of 21
Sort by:
Attacker Value
Unknown

CVE-2020-7660

Disclosure Date: June 01, 2020 (last updated February 21, 2025)
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".
Attacker Value
Unknown

Affected versions of serialize-javascript are vulnerable to Cross-site Scriptin…

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
The serialize-javascript npm package before version 2.1.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash-escapes all forward slashes in regular expressions. If serialized data of regular expression objects are used in an environment other than Node.js, it is affected by this vulnerability.
Attacker Value
Unknown

CVE-2019-3916

Disclosure Date: April 11, 2019 (last updated November 27, 2024)
Information disclosure vulnerability in Verizon Fios Quantum Gateway (G1100) firmware version 02.01.00.05 allows an remote, unauthenticated attacker to retrieve the value of the password salt by simply requesting an API URL in a web browser (e.g. /api).
0
Attacker Value
Unknown

CVE-2019-3914

Disclosure Date: April 11, 2019 (last updated November 27, 2024)
Remote command injection vulnerability in Verizon Fios Quantum Gateway (G1100) firmware version 02.01.00.05 allows a remote, authenticated attacker to execute arbitrary commands on the target device by adding an access control rule for a network object with a crafted hostname.
0
Attacker Value
Unknown

CVE-2019-3915

Disclosure Date: April 11, 2019 (last updated November 27, 2024)
Authentication Bypass by Capture-replay vulnerability in Verizon Fios Quantum Gateway (G1100) firmware version 02.01.00.05 allows an unauthenticated attacker with adjacent network access to intercept and replay login requests to gain access to the administrative web interface.
0
Attacker Value
Unknown

CVE-2014-5754

Disclosure Date: September 09, 2014 (last updated October 05, 2023)
The Verizon Instant Refills 24/7 (aka com.wVerizonInstantRefill247) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown

CVE-2013-4874

Disclosure Date: July 18, 2013 (last updated October 05, 2023)
The Uboot bootloader on the Verizon Wireless Network Extender SCS-26UC4 allows physically proximate attackers to obtain root access by connecting a crafted HDMI cable and using a sys session to modify the ramboot environment variable.
0
Attacker Value
Unknown

CVE-2013-4877

Disclosure Date: July 18, 2013 (last updated October 05, 2023)
The Verizon Wireless Network Extender SCS-26UC4 and SCS-2U01 does not use CAVE authentication, which makes it easier for remote attackers to obtain ESN and MIN values from arbitrary phones, and conduct cloning attacks, by sniffing the network for registration packets.
0
Attacker Value
Unknown

CVE-2013-4876

Disclosure Date: July 18, 2013 (last updated October 05, 2023)
The Verizon Wireless Network Extender SCS-2U01 has a hardcoded password for the root account, which makes it easier for physically proximate attackers to obtain administrative access by leveraging a login prompt.
0
Attacker Value
Unknown

CVE-2013-4875

Disclosure Date: July 18, 2013 (last updated October 05, 2023)
The Uboot bootloader on the Verizon Wireless Network Extender SCS-2U01 allows physically proximate attackers to bypass the intended boot process and obtain a login prompt by connecting a crafted HDMI cable and sending a SysReq interrupt.
0