Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2024-41594
Disclosure Date: October 03, 2024 (last updated October 09, 2024)
An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.
0
Attacker Value
Unknown
CVE-2024-41593
Disclosure Date: October 03, 2024 (last updated October 09, 2024)
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.
0
Attacker Value
Unknown
CVE-2024-41591
Disclosure Date: October 03, 2024 (last updated October 09, 2024)
DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.
0
Attacker Value
Unknown
CVE-2024-41587
Disclosure Date: October 03, 2024 (last updated October 08, 2024)
Stored XSS, by authenticated users, is caused by poor sanitization of the Login Page Greeting message in DrayTek Vigor310 devices through 4.3.2.6.
0
Attacker Value
Unknown
CVE-2019-16534
Disclosure Date: September 20, 2019 (last updated November 27, 2024)
On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product.
0
Attacker Value
Unknown
CVE-2019-16533
Disclosure Date: September 20, 2019 (last updated November 27, 2024)
On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product.
0