Show filters
1,310 Total Results
Displaying 451-460 of 1,310
Sort by:
Attacker Value
Unknown
CVE-2018-4068
Disclosure Date: May 06, 2019 (last updated November 27, 2024)
An exploitable information disclosure vulnerability exists in the ACEManager functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A HTTP request can result in disclosure of the default configuration for the device. An attacker can send an unauthenticated HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2018-4061
Disclosure Date: May 06, 2019 (last updated November 27, 2024)
An exploitable command injection vulnerability exists in the ACEManager iplogging.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can inject arbitrary commands, resulting in arbitrary command execution. An attacker can send an authenticated HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2019-1826
Disclosure Date: April 17, 2019 (last updated November 27, 2024)
A vulnerability in the quality of service (QoS) feature of Cisco Aironet Series Access Points (APs) could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation on QoS fields within Wi-Fi frames by the affected device. An attacker could exploit this vulnerability by sending malformed Wi-Fi frames to an affected device. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a DoS condition.
0
Attacker Value
Unknown
CVE-2019-1829
Disclosure Date: April 17, 2019 (last updated November 27, 2024)
A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due to improper validation of user-supplied input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input for a CLI command. A successful exploit could allow the attacker to obtain access to the underlying Linux OS without proper authentication.
0
Attacker Value
Unknown
CVE-2019-1835
Disclosure Date: April 17, 2019 (last updated November 27, 2024)
A vulnerability in the CLI of Cisco Aironet Access Points (APs) could allow an authenticated, local attacker to access sensitive information stored in an AP. The vulnerability is due to improper sanitization of user-supplied input in specific CLI commands. An attacker could exploit this vulnerability by accessing the CLI of an affected AP with administrator privileges and issuing crafted commands that result in directory traversal. A successful exploit could allow the attacker to view system files on the affected device, which could contain sensitive information. Software versions 8.8 and 8.9 are affected.
0
Attacker Value
Unknown
CVE-2019-1834
Disclosure Date: April 17, 2019 (last updated November 27, 2024)
A vulnerability in the internal packet processing of Cisco Aironet Series Access Points (APs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected AP if the switch interface where the AP is connected has port security configured. The vulnerability exists because the AP forwards some malformed wireless client packets outside of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel. An attacker could exploit this vulnerability by sending crafted wireless packets to an affected AP. A successful exploit could allow the attacker to trigger a security violation on the adjacent switch port, which could result in a DoS condition. Note: Though the Common Vulnerability Scoring System (CVSS) score corresponds to a High Security Impact Rating (SIR), this vulnerability is considered Medium because a workaround is available and exploitation requires a specific switch configuration. There are workarounds that address this vuln…
0
Attacker Value
Unknown
CVE-2019-0229
Disclosure Date: April 10, 2019 (last updated November 08, 2023)
A number of HTTP endpoints in the Airflow webserver (both RBAC and classic) did not have adequate protection and were vulnerable to cross-site request forgery attacks.
0
Attacker Value
Unknown
CVE-2019-0216
Disclosure Date: April 10, 2019 (last updated November 08, 2023)
A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views.
0
Attacker Value
Unknown
CVE-2019-10907
Disclosure Date: April 07, 2019 (last updated November 27, 2024)
Airsonic 10.2.1 uses Spring's default remember-me mechanism based on MD5, with a fixed key of airsonic in GlobalSecurityConfig.java. An attacker able to capture cookies might be able to trivially bruteforce offline the passwords of associated users.
0
Attacker Value
Unknown
CVE-2019-10908
Disclosure Date: April 07, 2019 (last updated November 27, 2024)
In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.
0