Show filters
53 Total Results
Displaying 21-30 of 53
Sort by:
Attacker Value
Unknown

CVE-2018-17587

Disclosure Date: October 02, 2018 (last updated November 27, 2024)
AirTies Air 5750 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
0
Attacker Value
Unknown

CVE-2018-17591

Disclosure Date: October 02, 2018 (last updated November 27, 2024)
AirTies Air 5343v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
0
Attacker Value
Unknown

CVE-2018-17589

Disclosure Date: October 02, 2018 (last updated November 27, 2024)
AirTies Air 5650 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
0
Attacker Value
Unknown

CVE-2018-17594

Disclosure Date: October 02, 2018 (last updated November 27, 2024)
AirTies Air 5443v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
0
Attacker Value
Unknown

CVE-2018-7510

Disclosure Date: June 06, 2018 (last updated November 26, 2024)
In the web application in BeaconMedaes TotalAlert Scroll Medical Air Systems running software versions prior to 4107600010.23, passwords are presented in plaintext in a file that is accessible without authentication.
0
Attacker Value
Unknown

CVE-2018-7526

Disclosure Date: May 24, 2018 (last updated November 26, 2024)
In TotalAlert Web Application in BeaconMedaes Scroll Medical Air Systems prior to v4107600010.23, by accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access information in the application without authenticating.
0
Attacker Value
Unknown

CVE-2018-7518

Disclosure Date: May 24, 2018 (last updated November 26, 2024)
In TotalAlert Web Application in BeaconMedaes Scroll Medical Air Systems prior to v4107600010.23, an attacker with network access to the integrated web server could retrieve default or user defined credentials stored and transmitted in an insecure manner.
0
Attacker Value
Unknown

CVE-2015-0936

Disclosure Date: June 01, 2017 (last updated November 26, 2024)
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.
Attacker Value
Unknown

CVE-2017-9137

Disclosure Date: May 21, 2017 (last updated November 26, 2024)
Ceragon FibeAir IP-10 wireless radios through 7.2.0 have a default password of mateidu for the mateidu account (a hidden user account established by the vendor). This account can be accessed via both the web interface and SSH. In the web interface, this simply grants an attacker read-only access to the device's settings. However, when using SSH, this gives an attacker access to a Linux shell. NOTE: the vendor has commented "The mateidu user is a known user, which is mentioned in the FibeAir IP-10 User Guide. Customers are instructed to change the mateidu user password. Changing the user password fully solves the vulnerability."
0
Attacker Value
Unknown

CVE-2016-10309

Disclosure Date: March 30, 2017 (last updated November 26, 2024)
In the GUI of Ceragon FibeAir IP-10 (before 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROSS cookie with the value 0-4-11 to their browser.
0