Show filters
924 Total Results
Displaying 31-40 of 924
Sort by:
Attacker Value
Unknown

CVE-2024-0207

Disclosure Date: January 03, 2024 (last updated January 10, 2024)
HTTP3 dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file
Attacker Value
Unknown

CVE-2023-50069

Disclosure Date: December 29, 2023 (last updated January 06, 2024)
WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.
Attacker Value
Unknown

CVE-2023-38321

Disclosure Date: December 25, 2023 (last updated January 04, 2024)
OpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to /opennds_auth/ that lacks a custom query string parameter and client-token.
Attacker Value
Unknown

CVE-2023-49225

Disclosure Date: December 07, 2023 (last updated December 13, 2023)
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
Attacker Value
Unknown

CVE-2023-40465

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
Several versions of ALEOS, including ALEOS 4.16.0, include an opensource third-party component which can be exploited from the local area network, resulting in a Denial of Service condition for the captive portal.
Attacker Value
Unknown

CVE-2023-40464

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
Several versions of ALEOS, including ALEOS 4.16.0, use a hardcoded SSL certificate and private key. An attacker with access to these items could potentially perform a man in the middle attack between the ACEManager client and ACEManager server.
Attacker Value
Unknown

CVE-2023-40463

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
When configured in debugging mode by an authenticated user with administrative privileges, ALEOS 4.16 and earlier store the SHA512 hash of the common root password for that version in a directory accessible to a user with root privileges or equivalent access.
Attacker Value
Unknown

CVE-2023-40462

Disclosure Date: December 04, 2023 (last updated February 14, 2025)
The ACEManager component of ALEOS 4.16 and earlier does not perform input sanitization during authentication, which could potentially result in a Denial of Service (DoS) condition for ACEManager without impairing other router functions. ACEManager recovers from the DoS condition by restarting within ten seconds of becoming unavailable.
Attacker Value
Unknown

CVE-2023-40461

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The ACEManager component of ALEOS 4.16 and earlier allows an authenticated user with Administrator privileges to access a file upload field which does not fully validate the file name, creating a Stored Cross-Site Scripting condition.
Attacker Value
Unknown

CVE-2023-40460

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The ACEManager component of ALEOS 4.16 and earlier does not validate uploaded file names and types, which could potentially allow an authenticated user to perform client-side script execution within ACEManager, altering the device functionality until the device is restarted.