Show filters
991 Total Results
Displaying 91-100 of 991
Sort by:
Attacker Value
Unknown

CVE-2023-46157

Disclosure Date: December 08, 2023 (last updated February 25, 2025)
File-Manager in MGT CloudPanel 2.0.0 through 2.3.2 allows the lowest privilege user to achieve OS command injection by changing file ownership and changing file permissions to 4755.
Attacker Value
Unknown

CVE-2023-6357

Disclosure Date: December 05, 2023 (last updated February 25, 2025)
A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.
Attacker Value
Unknown

CVE-2023-3631

Disclosure Date: November 23, 2023 (last updated February 25, 2025)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Medart Health Services Medart Notification Panel allows SQL Injection.This issue affects Medart Notification Panel: through 20231123.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2023-3379

Disclosure Date: November 20, 2023 (last updated February 25, 2025)
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.
Attacker Value
Unknown

CVE-2023-5839

Disclosure Date: October 29, 2023 (last updated February 25, 2025)
Privilege Chaining in GitHub repository hestiacp/hestiacp prior to 1.8.9.
Attacker Value
Unknown

CVE-2023-46102

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
The Android Client application, when enrolled to the AppHub server, connects to an MQTT broker to exchange messages and receive commands to execute on the HMI device. The protocol builds on top of MQTT to implement the remote management of the device is encrypted with a hard-coded DES symmetric key, that can be retrieved reversing both the Android Client application and the server-side web application. This issue allows an attacker able to control a malicious MQTT broker on the same subnet network of the device, to craft malicious messages and send them to the HMI device, executing arbitrary commands on the device itself.
Attacker Value
Unknown

CVE-2023-45851

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication.  This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device
Attacker Value
Unknown

CVE-2023-45844

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or eventually the device secure settings (ADB debug).
Attacker Value
Unknown

CVE-2023-45321

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user. Due to the lack of encryption of HTTP,this issue allows an attacker placed in the same subnet network of the HMI device to intercept username and password necessary to authenticate to the MQTT server responsible to implement the remote management protocol.
Attacker Value
Unknown

CVE-2023-45220

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
The Android Client application, when enrolled with the define method 1(the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user.