Show filters
324 Total Results
Displaying 51-60 of 324
Sort by:
Attacker Value
Unknown

CVE-2023-40465

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
Several versions of ALEOS, including ALEOS 4.16.0, include an opensource third-party component which can be exploited from the local area network, resulting in a Denial of Service condition for the captive portal.
Attacker Value
Unknown

CVE-2023-40464

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
Several versions of ALEOS, including ALEOS 4.16.0, use a hardcoded SSL certificate and private key. An attacker with access to these items could potentially perform a man in the middle attack between the ACEManager client and ACEManager server.
Attacker Value
Unknown

CVE-2023-40463

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
When configured in debugging mode by an authenticated user with administrative privileges, ALEOS 4.16 and earlier store the SHA512 hash of the common root password for that version in a directory accessible to a user with root privileges or equivalent access.
Attacker Value
Unknown

CVE-2023-40462

Disclosure Date: December 04, 2023 (last updated February 14, 2025)
The ACEManager component of ALEOS 4.16 and earlier does not perform input sanitization during authentication, which could potentially result in a Denial of Service (DoS) condition for ACEManager without impairing other router functions. ACEManager recovers from the DoS condition by restarting within ten seconds of becoming unavailable.
Attacker Value
Unknown

CVE-2023-40461

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The ACEManager component of ALEOS 4.16 and earlier allows an authenticated user with Administrator privileges to access a file upload field which does not fully validate the file name, creating a Stored Cross-Site Scripting condition.
Attacker Value
Unknown

CVE-2023-40460

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The ACEManager component of ALEOS 4.16 and earlier does not validate uploaded file names and types, which could potentially allow an authenticated user to perform client-side script execution within ACEManager, altering the device functionality until the device is restarted.
Attacker Value
Unknown

CVE-2023-40459

Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The ACEManager component of ALEOS 4.16 and earlier does not adequately perform input sanitization during authentication, which could potentially result in a Denial of Service (DoS) condition for ACEManager without impairing other router functions. ACEManager recovers from the DoS condition by restarting within ten seconds of becoming unavailable.
Attacker Value
Unknown

CVE-2023-40458

Disclosure Date: November 29, 2023 (last updated December 05, 2023)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Sierra Wireless, Inc ALEOS could potentially allow a remote attacker to trigger a Denial of Service (DoS) condition for ACEManager without impairing other router functions. This condition is cleared by restarting the device.
Attacker Value
Unknown

CVE-2023-46327

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
Multiple MFPs (multifunction printers) provided by FUJIFILM Business Innovation Corp. and Xerox Corporation provide a facility to export the contents of their Address Book with encrypted form, but the encryption strength is insufficient. With the knowledge of the encryption process and the encryption key, the information such as the server credentials may be obtained from the exported Address Book data. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
Attacker Value
Unknown

CVE-2023-43795

Disclosure Date: October 25, 2023 (last updated November 02, 2023)
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.