Show filters
88 Total Results
Displaying 61-70 of 88
Sort by:
Attacker Value
Unknown

CVE-2023-24519

Disclosure Date: July 06, 2023 (last updated October 08, 2023)
Two OS command injection vulnerability exist in the vtysh_ubus toolsh_excute.constprop.1 functionality of Milesight UR32L v32.3.0.5. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the ping tool utility.
Attacker Value
Unknown

CVE-2023-24496

Disclosure Date: July 06, 2023 (last updated October 08, 2023)
Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploited through the name field of the database.
Attacker Value
Unknown

CVE-2023-24019

Disclosure Date: July 06, 2023 (last updated October 08, 2023)
A stack-based buffer overflow vulnerability exists in the urvpn_client http_connection_readcb functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-24018

Disclosure Date: July 06, 2023 (last updated October 31, 2023)
A stack-based buffer overflow vulnerability exists in the libzebra.so.0.0.0 security_decrypt_password functionality of Milesight UR32L v32.3.0.5. A specially crafted HTTP request can lead to a buffer overflow. An authenticated attacker can send an HTTP request to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-23907

Disclosure Date: July 06, 2023 (last updated October 08, 2023)
A directory traversal vulnerability exists in the server.js start functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to arbitrary file read. An attacker can send a network request to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-23902

Disclosure Date: July 06, 2023 (last updated October 08, 2023)
A buffer overflow vulnerability exists in the uhttpd login functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to remote code execution. An attacker can send a network request to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-23571

Disclosure Date: July 06, 2023 (last updated October 08, 2023)
An access violation vulnerability exists in the eventcore functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to denial of service. An attacker can send a network request to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-23550

Disclosure Date: July 06, 2023 (last updated October 08, 2023)
An OS command injection vulnerability exists in the ys_thirdparty user_delete functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to command execution. An attacker can send a sequence of requests to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-23547

Disclosure Date: July 06, 2023 (last updated October 08, 2023)
A directory traversal vulnerability exists in the luci2-io file-export mib functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary file read. An attacker can send a network request to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-23546

Disclosure Date: July 06, 2023 (last updated October 08, 2023)
A misconfiguration vulnerability exists in the urvpn_client functionality of Milesight UR32L v32.3.0.5. A specially-crafted man-in-the-middle attack can lead to increased privileges. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.