Show filters
324 Total Results
Displaying 51-60 of 324
Sort by:
Attacker Value
Unknown
CVE-2023-40465
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
Several versions of
ALEOS, including ALEOS 4.16.0, include an opensource
third-party
component which can be exploited from the local
area network,
resulting in a Denial of Service condition for the captive portal.
0
Attacker Value
Unknown
CVE-2023-40464
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
Several versions of
ALEOS, including ALEOS 4.16.0, use a hardcoded
SSL certificate and
private key. An attacker with access to these items
could potentially
perform a man in the middle attack between the
ACEManager client
and ACEManager server.
0
Attacker Value
Unknown
CVE-2023-40463
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
When configured in
debugging mode by an authenticated user with
administrative
privileges, ALEOS 4.16 and earlier store the SHA512
hash of the common
root password for that version in a directory
accessible to a user
with root privileges or equivalent access.
0
Attacker Value
Unknown
CVE-2023-40462
Disclosure Date: December 04, 2023 (last updated February 14, 2025)
The ACEManager
component of ALEOS 4.16 and earlier does not
perform input
sanitization during authentication, which could
potentially result
in a Denial of Service (DoS) condition for
ACEManager without
impairing other router functions. ACEManager
recovers from the
DoS condition by restarting within ten seconds of
becoming
unavailable.
0
Attacker Value
Unknown
CVE-2023-40461
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The ACEManager
component of ALEOS 4.16 and earlier allows an
authenticated user
with Administrator privileges to access a file
upload field which
does not fully validate the file name, creating a
Stored Cross-Site
Scripting condition.
0
Attacker Value
Unknown
CVE-2023-40460
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The ACEManager
component of ALEOS 4.16 and earlier does not
validate uploaded
file names and types, which could potentially allow
an authenticated
user to perform client-side script execution within
ACEManager, altering
the device functionality until the device is
restarted.
0
Attacker Value
Unknown
CVE-2023-40459
Disclosure Date: December 04, 2023 (last updated December 09, 2023)
The
ACEManager component of ALEOS 4.16 and earlier does not adequately perform
input sanitization during authentication, which could potentially result in a
Denial of Service (DoS) condition for ACEManager without impairing other router
functions. ACEManager recovers from the DoS condition by restarting within ten
seconds of becoming unavailable.
0
Attacker Value
Unknown
CVE-2023-40458
Disclosure Date: November 29, 2023 (last updated December 05, 2023)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Sierra Wireless, Inc ALEOS could potentially allow a remote attacker to trigger a
Denial of Service (DoS) condition for ACEManager without impairing
other router functions. This condition is cleared by restarting the
device.
0
Attacker Value
Unknown
CVE-2023-46327
Disclosure Date: November 02, 2023 (last updated November 10, 2023)
Multiple MFPs (multifunction printers) provided by FUJIFILM Business Innovation Corp. and Xerox Corporation provide a facility to export the contents of their Address Book with encrypted form, but the encryption strength is insufficient. With the knowledge of the encryption process and the encryption key, the information such as the server credentials may be obtained from the exported Address Book data. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
0
Attacker Value
Unknown
CVE-2023-43795
Disclosure Date: October 25, 2023 (last updated November 02, 2023)
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.
0