Show filters
53 Total Results
Displaying 21-30 of 53
Sort by:
Attacker Value
Unknown
CVE-2018-17587
Disclosure Date: October 02, 2018 (last updated November 27, 2024)
AirTies Air 5750 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
0
Attacker Value
Unknown
CVE-2018-17591
Disclosure Date: October 02, 2018 (last updated November 27, 2024)
AirTies Air 5343v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
0
Attacker Value
Unknown
CVE-2018-17589
Disclosure Date: October 02, 2018 (last updated November 27, 2024)
AirTies Air 5650 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
0
Attacker Value
Unknown
CVE-2018-17594
Disclosure Date: October 02, 2018 (last updated November 27, 2024)
AirTies Air 5443v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
0
Attacker Value
Unknown
CVE-2018-7510
Disclosure Date: June 06, 2018 (last updated November 26, 2024)
In the web application in BeaconMedaes TotalAlert Scroll Medical Air Systems running software versions prior to 4107600010.23, passwords are presented in plaintext in a file that is accessible without authentication.
0
Attacker Value
Unknown
CVE-2018-7526
Disclosure Date: May 24, 2018 (last updated November 26, 2024)
In TotalAlert Web Application in BeaconMedaes Scroll Medical Air Systems prior to v4107600010.23, by accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access information in the application without authenticating.
0
Attacker Value
Unknown
CVE-2018-7518
Disclosure Date: May 24, 2018 (last updated November 26, 2024)
In TotalAlert Web Application in BeaconMedaes Scroll Medical Air Systems prior to v4107600010.23, an attacker with network access to the integrated web server could retrieve default or user defined credentials stored and transmitted in an insecure manner.
0
Attacker Value
Unknown
CVE-2015-0936
Disclosure Date: June 01, 2017 (last updated November 26, 2024)
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.
0
Attacker Value
Unknown
CVE-2017-9137
Disclosure Date: May 21, 2017 (last updated November 26, 2024)
Ceragon FibeAir IP-10 wireless radios through 7.2.0 have a default password of mateidu for the mateidu account (a hidden user account established by the vendor). This account can be accessed via both the web interface and SSH. In the web interface, this simply grants an attacker read-only access to the device's settings. However, when using SSH, this gives an attacker access to a Linux shell. NOTE: the vendor has commented "The mateidu user is a known user, which is mentioned in the FibeAir IP-10 User Guide. Customers are instructed to change the mateidu user password. Changing the user password fully solves the vulnerability."
0
Attacker Value
Unknown
CVE-2016-10309
Disclosure Date: March 30, 2017 (last updated November 26, 2024)
In the GUI of Ceragon FibeAir IP-10 (before 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROSS cookie with the value 0-4-11 to their browser.
0