Show filters
3,317 Total Results
Displaying 361-370 of 3,317
Sort by:
Attacker Value
Unknown

CVE-2023-22439

Disclosure Date: December 18, 2023 (last updated February 25, 2025)
Improper input validation of a large HTTP request in the Controller 6000 and Controller 7000 optional diagnostic web interface (Port 80) can be used to perform a Denial of Service of the diagnostic web interface. This issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
Attacker Value
Unknown

CVE-2023-46156

Disclosure Date: December 12, 2023 (last updated February 25, 2025)
Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a denial of service condition. A restart is needed to restore normal operations.
Attacker Value
Unknown

CVE-2023-6357

Disclosure Date: December 05, 2023 (last updated February 25, 2025)
A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.
Attacker Value
Unknown

CVE-2023-6269

Disclosure Date: December 05, 2023 (last updated February 25, 2025)
An argument injection vulnerability has been identified in the administrative web interface of the Atos Unify OpenScape products "Session Border Controller" (SBC) and "Branch", before version V10 R3.4.0, and OpenScape "BCF" before versions V10R10.12.00 and V10R11.05.02. This allows an unauthenticated attacker to gain root access to the appliance via SSH (scope change) and also bypass authentication for the administrative interface and gain access as an arbitrary (administrative) user.
Attacker Value
Unknown

CVE-2023-5188

Disclosure Date: December 05, 2023 (last updated February 25, 2025)
The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device.
Attacker Value
Unknown

CVE-2023-39257

Disclosure Date: December 02, 2023 (last updated February 25, 2025)
Dell Rugged Control Center, version prior to 4.7, contains an Improper Access Control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder when product installation repair is performed, leading to privilege escalation on the system.
Attacker Value
Unknown

CVE-2023-39256

Disclosure Date: December 02, 2023 (last updated February 25, 2025)
Dell Rugged Control Center, version prior to 4.7, contains an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder during product installation and upgrade, leading to privilege escalation on the system.
Attacker Value
Unknown

CVE-2023-43089

Disclosure Date: December 01, 2023 (last updated February 25, 2025)
Dell Rugged Control Center, version prior to 4.7, contains insufficient protection for the Policy folder. A local malicious standard user could potentially exploit this vulnerability to modify the content of the policy file, leading to unauthorized access to resources.
Attacker Value
Unknown

CVE-2023-5247

Disclosure Date: November 30, 2023 (last updated February 25, 2025)
Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file, which could result in information disclosure, tampering and deletion, or a denial-of-service (DoS) condition.
Attacker Value
Unknown

CVE-2023-5607

Disclosure Date: November 27, 2023 (last updated February 25, 2025)
An improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. The attacker would need the appropriate privileges to access the relevant section of the User Interface. The import logic has been updated to restrict file types and content.