Show filters
20,400 Total Results
Displaying 41-50 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Very High
CVE-2023-6448
Disclosure Date: December 05, 2023 (last updated June 27, 2024)
Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
2
Attacker Value
High
CVE-2023-33625
Disclosure Date: June 12, 2023 (last updated October 08, 2023)
D-Link DIR-600 Hardware Version B5, Firmware Version 2.18 was discovered to contain a command injection vulnerability via the ST parameter in the lxmldbc_system() function.
2
Attacker Value
Very High
CVE-2023-30013
Disclosure Date: May 05, 2023 (last updated February 24, 2025)
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setting/setTracerouteCfg. This vulnerability allows an attacker to execute arbitrary commands through the "command" parameter.
2
Attacker Value
Very High
CVE-2023-28489
Disclosure Date: April 11, 2023 (last updated February 24, 2025)
A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default.
The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device.
2
Attacker Value
Very High
CVE-2023-23333
Disclosure Date: February 06, 2023 (last updated February 24, 2025)
There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.
2
Attacker Value
Very Low
CVE-2023-20073
Disclosure Date: February 02, 2023 (last updated February 24, 2025)
A vulnerability in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to insufficient authorization enforcement mechanisms in the context of file uploads. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to upload arbitrary files to the affected device.
2
Attacker Value
High
CVE-2023-0126
Disclosure Date: January 19, 2023 (last updated February 24, 2025)
Pre-authentication path traversal vulnerability in SMA1000 firmware version 12.4.2, which allows an unauthenticated attacker to access arbitrary files and directories stored outside the web root directory.
2
Attacker Value
Very High
CVE-2022-27255
Disclosure Date: August 01, 2022 (last updated February 24, 2025)
In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.
2
Attacker Value
Unknown
CVE-2021-36260
Disclosure Date: September 22, 2021 (last updated February 23, 2025)
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
3
Attacker Value
Unknown
CVE-2020-11951
Disclosure Date: July 14, 2020 (last updated February 21, 2025)
An issue was discovered on Rittal PDU-3C002DEC through 5.17.10 and CMCIII-PU-9333E0FB through 3.17.10 devices. There is a Backdoor root account.
3