Show filters
420 Total Results
Displaying 121-130 of 420
Sort by:
Attacker Value
Unknown
CVE-2023-23295
Disclosure Date: February 23, 2023 (last updated February 24, 2025)
Korenix Jetwave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 are vulnerable to Command Injection via /goform/formSysCmd. An attacker an modify the sysCmd parameter in order to execute commands as root.
0
Attacker Value
Unknown
CVE-2023-23294
Disclosure Date: February 23, 2023 (last updated February 24, 2025)
Korenix JetWave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 are vulnerable to Command Injection. An attacker can modify the file_name parameter to execute commands as root.
0
Attacker Value
Unknown
CVE-2022-37918
Disclosure Date: December 08, 2022 (last updated February 24, 2025)
Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below.
0
Attacker Value
Unknown
CVE-2022-37917
Disclosure Date: December 08, 2022 (last updated February 24, 2025)
Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below.
0
Attacker Value
Unknown
CVE-2022-37916
Disclosure Date: December 08, 2022 (last updated February 24, 2025)
Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below.
0
Attacker Value
Unknown
CVE-2022-30262
Disclosure Date: August 17, 2022 (last updated February 24, 2025)
The Emerson ControlWave 'Next Generation' RTUs through 2022-05-02 mishandle firmware integrity. They utilize the BSAP-IP protocol to transmit firmware updates. Firmware updates are supplied as CAB archive files containing a binary firmware image. In all cases, firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.
0
Attacker Value
Unknown
CVE-2022-34907
Disclosure Date: July 25, 2022 (last updated February 24, 2025)
An authentication bypass vulnerability exists in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to gain access to the system with the highest authority possible and gain full control over the FileWave platform.
0
Attacker Value
Unknown
CVE-2022-34906
Disclosure Date: July 25, 2022 (last updated February 24, 2025)
A hard-coded cryptographic key is used in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to decrypt sensitive information saved in FileWave, and even send crafted requests.
0
Attacker Value
Unknown
CVE-2021-39280
Disclosure Date: February 06, 2022 (last updated October 07, 2023)
Certain Korenix JetWave devices allow authenticated users to execute arbitrary code as root via /syscmd.asp. This affects 2212X before 1.9.1, 2212S before 1.9.1, 2212G before 1.8, 3220 V3 before 1.5.1, 3420 V3 before 1.5.1, and 2311 through 2022-01-31.
0
Attacker Value
Unknown
CVE-2021-21896
Disclosure Date: December 22, 2021 (last updated February 23, 2025)
A directory traversal vulnerability exists in the Web Manager FsBrowseClean functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to arbitrary file deletion. An attacker can make an authenticated HTTP request to trigger this vulnerability.
0