Show filters
529 Total Results
Displaying 51-60 of 529
Sort by:
Attacker Value
Unknown
CVE-2023-45886
Disclosure Date: November 21, 2023 (last updated November 30, 2023)
The BGP daemon (bgpd) in IP Infusion ZebOS through 7.10.6 allow remote attackers to cause a denial of service by sending crafted BGP update messages containing a malformed attribute.
0
Attacker Value
Unknown
CVE-2023-6105
Disclosure Date: November 15, 2023 (last updated February 14, 2025)
An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
0
Attacker Value
Unknown
CVE-2023-40055
Disclosure Date: November 09, 2023 (last updated November 18, 2023)
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33227
0
Attacker Value
Unknown
CVE-2023-40054
Disclosure Date: November 09, 2023 (last updated November 18, 2023)
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33226
0
Attacker Value
Unknown
CVE-2023-33228
Disclosure Date: November 01, 2023 (last updated November 10, 2023)
The SolarWinds Network Configuration Manager was susceptible to the Exposure of Sensitive Information Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to obtain sensitive information.
0
Attacker Value
Unknown
CVE-2023-33227
Disclosure Date: November 01, 2023 (last updated November 10, 2023)
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability This vulnerability allows a low level user to perform the actions with SYSTEM privileges.
0
Attacker Value
Unknown
CVE-2023-33226
Disclosure Date: November 01, 2023 (last updated November 10, 2023)
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges.
0
Attacker Value
Unknown
CVE-2023-3935
Disclosure Date: September 13, 2023 (last updated January 26, 2024)
A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
0
Attacker Value
Unknown
CVE-2023-20222
Disclosure Date: August 16, 2023 (last updated October 08, 2023)
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device.
The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
0
Attacker Value
Unknown
CVE-2023-20205
Disclosure Date: August 16, 2023 (last updated October 08, 2023)
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.
0