Show filters
924 Total Results
Displaying 31-40 of 924
Sort by:
Attacker Value
Unknown
CVE-2024-0207
Disclosure Date: January 03, 2024 (last updated January 10, 2024)
HTTP3 dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file
0
Attacker Value
Unknown
CVE-2023-50069
Disclosure Date: December 29, 2023 (last updated January 06, 2024)
WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.
0
Attacker Value
Unknown
CVE-2023-38321
Disclosure Date: December 25, 2023 (last updated January 04, 2024)
OpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to /opennds_auth/ that lacks a custom query string parameter and client-token.
0
Attacker Value
Unknown
CVE-2023-49225
Disclosure Date: December 07, 2023 (last updated December 13, 2023)
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
0
Attacker Value
Unknown
CVE-2023-40465
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
Several versions of
ALEOS, including ALEOS 4.16.0, include an opensource
third-party
component which can be exploited from the local
area network,
resulting in a Denial of Service condition for the captive portal.
0
Attacker Value
Unknown
CVE-2023-40464
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
Several versions of
ALEOS, including ALEOS 4.16.0, use a hardcoded
SSL certificate and
private key. An attacker with access to these items
could potentially
perform a man in the middle attack between the
ACEManager client
and ACEManager server.
0
Attacker Value
Unknown
CVE-2023-40463
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
When configured in
debugging mode by an authenticated user with
administrative
privileges, ALEOS 4.16 and earlier store the SHA512
hash of the common
root password for that version in a directory
accessible to a user
with root privileges or equivalent access.
0
Attacker Value
Unknown
CVE-2023-40462
Disclosure Date: December 04, 2023 (last updated February 14, 2025)
The ACEManager
component of ALEOS 4.16 and earlier does not
perform input
sanitization during authentication, which could
potentially result
in a Denial of Service (DoS) condition for
ACEManager without
impairing other router functions. ACEManager
recovers from the
DoS condition by restarting within ten seconds of
becoming
unavailable.
0
Attacker Value
Unknown
CVE-2023-40461
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The ACEManager
component of ALEOS 4.16 and earlier allows an
authenticated user
with Administrator privileges to access a file
upload field which
does not fully validate the file name, creating a
Stored Cross-Site
Scripting condition.
0
Attacker Value
Unknown
CVE-2023-40460
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The ACEManager
component of ALEOS 4.16 and earlier does not
validate uploaded
file names and types, which could potentially allow
an authenticated
user to perform client-side script execution within
ACEManager, altering
the device functionality until the device is
restarted.
0