Show filters
234 Total Results
Displaying 21-30 of 234
Sort by:
Attacker Value
Unknown
CVE-2023-5677
Disclosure Date: February 05, 2024 (last updated November 08, 2024)
Brandon
Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi
did not have a sufficient input validation allowing for a possible remote code
execution. This flaw can only be exploited after authenticating with an
operator- or administrator-privileged service account. The impact of exploiting
this vulnerability is lower with operator-privileges compared to
administrator-privileges service accounts. Axis has released patched AXIS OS
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.
0
Attacker Value
Unknown
CVE-2023-6304
Disclosure Date: November 27, 2023 (last updated December 02, 2023)
A vulnerability was found in Tecno 4G Portable WiFi TR118 TR118-M30E-RR-D-EnFrArSwHaPo-OP-V008-20220830. It has been declared as critical. This vulnerability affects unknown code of the file /goform/goform_get_cmd_process of the component Ping Tool. The manipulation of the argument url leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-246130 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2023-3703
Disclosure Date: September 03, 2023 (last updated October 08, 2023)
Proscend Advice ICR Series routers FW version 1.76 - CWE-1392: Use of Default Credentials
0
Attacker Value
Unknown
CVE-2023-35178
Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow when performing a GET request to scan jobs.
0
Attacker Value
Unknown
CVE-2023-35177
Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to a stack-based buffer overflow related to the compact font format parser.
0
Attacker Value
Unknown
CVE-2023-35176
Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Denial of Service when using the backup & restore feature through the embedded web service on the device.
0
Attacker Value
Unknown
CVE-2023-35175
Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Potential Remote Code Execution and/or Elevation of Privilege via Server-Side Request Forgery (SSRF) using the Web Service Eventing model.
0
Attacker Value
Unknown
CVE-2023-27396
Disclosure Date: June 19, 2023 (last updated October 08, 2023)
FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)
0
Attacker Value
Unknown
CVE-2023-27973
Disclosure Date: April 28, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Heap Overflow and/or Remote Code Execution.
0
Attacker Value
Unknown
CVE-2023-27972
Disclosure Date: April 28, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Remote Code Execution.
0