Show filters
420 Total Results
Displaying 121-130 of 420
Sort by:
Attacker Value
Unknown

CVE-2023-23295

Disclosure Date: February 23, 2023 (last updated February 24, 2025)
Korenix Jetwave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 are vulnerable to Command Injection via /goform/formSysCmd. An attacker an modify the sysCmd parameter in order to execute commands as root.
Attacker Value
Unknown

CVE-2023-23294

Disclosure Date: February 23, 2023 (last updated February 24, 2025)
Korenix JetWave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 are vulnerable to Command Injection. An attacker can modify the file_name parameter to execute commands as root.
Attacker Value
Unknown

CVE-2022-37918

Disclosure Date: December 08, 2022 (last updated February 24, 2025)
Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below.
Attacker Value
Unknown

CVE-2022-37917

Disclosure Date: December 08, 2022 (last updated February 24, 2025)
Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below.
Attacker Value
Unknown

CVE-2022-37916

Disclosure Date: December 08, 2022 (last updated February 24, 2025)
Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below.
Attacker Value
Unknown

CVE-2022-30262

Disclosure Date: August 17, 2022 (last updated February 24, 2025)
The Emerson ControlWave 'Next Generation' RTUs through 2022-05-02 mishandle firmware integrity. They utilize the BSAP-IP protocol to transmit firmware updates. Firmware updates are supplied as CAB archive files containing a binary firmware image. In all cases, firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.
Attacker Value
Unknown

CVE-2022-34907

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
An authentication bypass vulnerability exists in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to gain access to the system with the highest authority possible and gain full control over the FileWave platform.
Attacker Value
Unknown

CVE-2022-34906

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
A hard-coded cryptographic key is used in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to decrypt sensitive information saved in FileWave, and even send crafted requests.
Attacker Value
Unknown

CVE-2021-39280

Disclosure Date: February 06, 2022 (last updated October 07, 2023)
Certain Korenix JetWave devices allow authenticated users to execute arbitrary code as root via /syscmd.asp. This affects 2212X before 1.9.1, 2212S before 1.9.1, 2212G before 1.8, 3220 V3 before 1.5.1, 3420 V3 before 1.5.1, and 2311 through 2022-01-31.
Attacker Value
Unknown

CVE-2021-21896

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
A directory traversal vulnerability exists in the Web Manager FsBrowseClean functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to arbitrary file deletion. An attacker can make an authenticated HTTP request to trigger this vulnerability.