Show filters
246 Total Results
Displaying 181-190 of 246
Sort by:
Attacker Value
Unknown
CVE-2017-17737
Disclosure Date: December 18, 2017 (last updated November 26, 2024)
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has XSS via the REF parameter to /network_diagnostics.html or /storage_info.html.
0
Attacker Value
Unknown
CVE-2017-17738
Disclosure Date: December 18, 2017 (last updated November 26, 2024)
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) allows renaming and modifying files via /tools.html.
0
Attacker Value
Unknown
CVE-2017-17739
Disclosure Date: December 18, 2017 (last updated November 26, 2024)
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has directory traversal via the /storage.html rp parameter, allowing an attacker to read or write to files.
0
Attacker Value
Unknown
CVE-2017-6770
Disclosure Date: August 07, 2017 (last updated November 26, 2024)
Cisco IOS 12.0 through 15.6, Adaptive Security Appliance (ASA) Software 7.0.1 through 9.7.1.2, NX-OS 4.0 through 12.0, and IOS XE 3.6 through 3.18 are affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could allow an unauthenticated, remote attacker to take full control of the OSPF Autonomous System (AS) domain routing table, allowing the attacker to intercept or black-hole traffic. The attacker could exploit this vulnerability by injecting crafted OSPF packets. Successful exploitation could cause the targeted router to flush its routing table and propagate the crafted OSPF LSA type 1 update throughout the OSPF AS domain. To exploit this vulnerability, an attacker must accurately determine certain parameters within the LSA database on the target router. This vulnerability can only be triggered by sending crafted unicast or multicast OSPF LSA type 1 packets. No other LSA type packets can…
0
Attacker Value
Unknown
CVE-2017-5691
Disclosure Date: July 26, 2017 (last updated November 26, 2024)
Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows compromised system firmware to impact SGX security via incorrect early system state.
0
Attacker Value
Unknown
CVE-2017-11495
Disclosure Date: July 20, 2017 (last updated November 26, 2024)
PHICOMM K2(PSG1218) devices V22.5.11.5 and earlier allow unauthenticated remote code execution via a request to an unspecified ASP script; alternatively, the attacker can leverage unauthenticated access to this script to trigger a reboot via an ifType=reboot action.
0
Attacker Value
Unknown
CVE-2017-5684
Disclosure Date: April 03, 2017 (last updated November 26, 2024)
The BIOS in Intel Compute Stick systems based on 6th Gen Intel Core processors prior to version CC047 may allow an attacker with physical access to the system to gain access to personal information.
0
Attacker Value
Unknown
CVE-2016-5811
Disclosure Date: February 13, 2017 (last updated November 26, 2024)
An issue was discovered in Visonic PowerLink2, all versions prior to October 2016 firmware release. User controlled input is not neutralized prior to being placed in web page output (CROSS-SITE SCRIPTING).
0
Attacker Value
Unknown
CVE-2016-5813
Disclosure Date: February 13, 2017 (last updated November 26, 2024)
An issue was discovered in Visonic PowerLink2, all versions prior to October 2016 firmware release. When a specific URL to an image is accessed, the downloaded image carries with it source code used in the web server (INFORMATION EXPOSURE).
0
Attacker Value
Unknown
CVE-2016-8224
Disclosure Date: November 29, 2016 (last updated November 25, 2024)
A vulnerability has been identified in some Lenovo Notebook and ThinkServer systems where an attacker with administrative privileges on a system could install a program that circumvents Intel Management Engine (ME) protections. This could result in a denial of service or privilege escalation attack on the system.
0