Show filters
296 Total Results
Displaying 31-40 of 296
Sort by:
Attacker Value
Unknown

CVE-2023-39983

Disclosure Date: September 02, 2023 (last updated October 08, 2023)
A vulnerability that poses a potential risk of polluting the MXsecurity sqlite database and the nsm-web UI has been identified in MXsecurity versions prior to v1.0.1. This vulnerability might allow an unauthenticated remote attacker to register or add devices via the nsm-web application.
Attacker Value
Unknown

CVE-2023-39982

Disclosure Date: September 02, 2023 (last updated October 28, 2024)
A vulnerability has been identified in MXsecurity versions prior to v1.0.1. The vulnerability may put the confidentiality and integrity of SSH communications at risk on the affected device. This vulnerability is attributed to a hard-coded SSH host key, which might facilitate man-in-the-middle attacks and enable the decryption of SSH traffic.
Attacker Value
Unknown

CVE-2023-39981

Disclosure Date: September 02, 2023 (last updated October 28, 2024)
A vulnerability that allows for unauthorized access has been discovered in MXsecurity versions prior to v1.0.1. This vulnerability arises from inadequate authentication measures, potentially leading to the disclosure of device information by a remote attacker.
Attacker Value
Unknown

CVE-2023-39980

Disclosure Date: September 02, 2023 (last updated October 08, 2023)
A vulnerability that allows the unauthorized disclosure of authenticated information has been identified in MXsecurity versions prior to v1.0.1. This vulnerability arises when special elements are not neutralized correctly, allowing remote attackers to alter SQL commands.
Attacker Value
Unknown

CVE-2023-39979

Disclosure Date: September 02, 2023 (last updated October 08, 2023)
There is a vulnerability in MXsecurity versions prior to 1.0.1 that can be exploited to bypass authentication. A remote attacker might access the system if the web service authenticator has insufficient random values.  
Attacker Value
Unknown

CVE-2023-4230

Disclosure Date: August 24, 2023 (last updated October 08, 2023)
A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which has the potential to facilitate the collection of information on ioLogik 4000 Series devices. This vulnerability may enable attackers to gather information for the purpose of assessing vulnerabilities and potential attack vectors.
Attacker Value
Unknown

CVE-2023-4229

Disclosure Date: August 24, 2023 (last updated October 08, 2023)
A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, potentially exposing users to security risks. This vulnerability may allow attackers to trick users into interacting with malicious content, leading to unintended actions or unauthorized data disclosures.
Attacker Value
Unknown

CVE-2023-4228

Disclosure Date: August 24, 2023 (last updated October 08, 2023)
A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.
Attacker Value
Unknown

CVE-2023-4227

Disclosure Date: August 24, 2023 (last updated October 28, 2024)
A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device.
Attacker Value
Unknown

CVE-2023-34217

Disclosure Date: August 17, 2023 (last updated October 20, 2023)
TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation in the certificate-delete function, which could potentially allow malicious users to delete arbitrary files.