Show filters
224 Total Results
Displaying 81-90 of 224
Sort by:
Attacker Value
Unknown

CVE-2022-35212

Disclosure Date: August 18, 2022 (last updated February 24, 2025)
osCommerce2 before v2.3.4.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the function tep_db_error().
Attacker Value
Unknown

CVE-2022-30276

Disclosure Date: July 26, 2022 (last updated February 24, 2025)
The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.
Attacker Value
Unknown

CVE-2022-26484

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. The web server fails to sanitize admin/cgi-bin/rulemgr.pl/getfile/ input data, allowing a remote authenticated administrator to read arbitrary files on the system via Directory Traversal. By manipulating the resource name in GET requests referring to files with absolute paths, it is possible to access arbitrary files stored on the filesystem, including application source code, configuration files, and critical system files.
Attacker Value
Unknown

CVE-2022-26483

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. A reflected cross-site scripting (XSS) vulnerability in admin/cgi-bin/listdir.pl allows authenticated remote administrators to inject arbitrary web script or HTML into an HTTP GET parameter (which reflect the user input without sanitization).
Attacker Value
Unknown

CVE-2021-23862

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
A crafted configuration packet sent by an authenticated administrative user can be used to execute arbitrary commands in system context. This issue also affects installations of the VRM, DIVAR IP, BVMS with VRM installed, the VIDEOJET decoder (VJD-7513 and VJD-8000).
Attacker Value
Unknown

CVE-2021-23860

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
An error in a page handler of the VRM may lead to a reflected cross site scripting (XSS) in the web-based interface. To exploit this vulnerability an attack must be able to modify the HTTP header that is sent. This issue also affects installations of the DIVAR IP and BVMS with VRM installed.
Attacker Value
Unknown

CVE-2021-23859

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859
Attacker Value
Unknown

CVE-2021-23861

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
By executing a special command, an user with administrative rights can get access to extended debug functionality on the VRM allowing an impact on integrity or availability of the installed software. This issue also affects installations of the DIVAR IP and BVMS with VRM installed.
Attacker Value
Unknown

CVE-2020-12733

Disclosure Date: July 15, 2021 (last updated February 23, 2025)
Certain Shenzhen PENGLIXIN components on DEPSTECH WiFi Digital Microscope 3, as used by Shekar Endoscope, allow a TELNET connection with the molinkadmin password for the molink account.
Attacker Value
Unknown

CVE-2020-12732

Disclosure Date: July 15, 2021 (last updated February 23, 2025)
DEPSTECH WiFi Digital Microscope 3 has a default SSID of Jetion_xxxxxxxx with a password of 12345678.