Show filters
794 Total Results
Displaying 171-180 of 794
Sort by:
Attacker Value
Unknown
CVE-2023-31178
Disclosure Date: May 08, 2023 (last updated October 08, 2023)
AgilePoint NX v8.0 SU2.2 & SU2.3 – Arbitrary File Delete Vulnerability allows arbitrary file deletion, by an unspecified request.
0
Attacker Value
Unknown
CVE-2023-24507
Disclosure Date: May 08, 2023 (last updated February 24, 2025)
AgilePoint NX v8.0 SU2.2 & SU2.3 – Insecure File Upload - Vulnerability allows insecure file upload, by an unspecified request.
0
Attacker Value
Unknown
CVE-2023-28724
Disclosure Date: May 03, 2023 (last updated February 24, 2025)
NGINX Management Suite default file permissions are set such that an authenticated attacker may be able to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2023-28656
Disclosure Date: May 03, 2023 (last updated February 24, 2025)
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2023-30467
Disclosure Date: April 28, 2023 (last updated February 24, 2025)
This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to improper authorization at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.
Successful exploitation of this vulnerability could allow remote attacker to perform unauthorized activities on the targeted device.
0
Attacker Value
Unknown
CVE-2023-30466
Disclosure Date: April 28, 2023 (last updated February 24, 2025)
This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.
Successful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.
0
Attacker Value
Unknown
CVE-2023-25556
Disclosure Date: April 18, 2023 (last updated February 24, 2025)
A CWE-287: Improper Authentication vulnerability exists that could allow a device to be
compromised when a key of less than seven digits is entered and the attacker has access to the
KNX installation.
0
Attacker Value
Unknown
CVE-2023-1752
Disclosure Date: April 04, 2023 (last updated February 24, 2025)
The listed versions of Nexx Smart Home devices could allow any user to register an already registered alarm or associated device with only the device’s MAC address.
0
Attacker Value
Unknown
CVE-2023-1751
Disclosure Date: April 04, 2023 (last updated October 08, 2023)
The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which leak a deviceId.
0
Attacker Value
Unknown
CVE-2023-1750
Disclosure Date: April 04, 2023 (last updated February 24, 2025)
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information.
0