Show filters
234 Total Results
Displaying 21-30 of 234
Sort by:
Attacker Value
Unknown

CVE-2023-5677

Disclosure Date: February 05, 2024 (last updated November 08, 2024)
Brandon Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Attacker Value
Unknown

CVE-2023-6304

Disclosure Date: November 27, 2023 (last updated December 02, 2023)
A vulnerability was found in Tecno 4G Portable WiFi TR118 TR118-M30E-RR-D-EnFrArSwHaPo-OP-V008-20220830. It has been declared as critical. This vulnerability affects unknown code of the file /goform/goform_get_cmd_process of the component Ping Tool. The manipulation of the argument url leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-246130 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2023-3703

Disclosure Date: September 03, 2023 (last updated October 08, 2023)
Proscend Advice ICR Series routers FW version 1.76 - CWE-1392: Use of Default Credentials
Attacker Value
Unknown

CVE-2023-35178

Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow when performing a GET request to scan jobs.
Attacker Value
Unknown

CVE-2023-35177

Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to a stack-based buffer overflow related to the compact font format parser.
Attacker Value
Unknown

CVE-2023-35176

Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Denial of Service when using the backup & restore feature through the embedded web service on the device.
Attacker Value
Unknown

CVE-2023-35175

Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Potential Remote Code Execution and/or Elevation of Privilege via Server-Side Request Forgery (SSRF) using the Web Service Eventing model.
Attacker Value
Unknown

CVE-2023-27396

Disclosure Date: June 19, 2023 (last updated October 08, 2023)
FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)
Attacker Value
Unknown

CVE-2023-27973

Disclosure Date: April 28, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Heap Overflow and/or Remote Code Execution.
Attacker Value
Unknown

CVE-2023-27972

Disclosure Date: April 28, 2023 (last updated October 08, 2023)
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Remote Code Execution.