CVE
Vendors
Products
Updated
CVSS v2
CVSS v3
Brl-04cw, Brl-04r, Brl-04ur, Cs-qr10, Cs-qr10_firmware, Cs-qr20, Cs-qr20_firmware, Cs-w50hd, Cs-w50hd_firmware, Cs-wmv02g
2023-02-22
N/A
6.1 MEDIUM
** UNSUPPORTED WHEN ASSIGNED ** Reflected cross-site scripting vulnerability in Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G all versions allows a remote unauthenticated attacker to inject arbitrary script to inject an arbitrary script. NOTE: This vulnerability only affects products that are no longer supported by the developer.
Brl-04cw, Brl-04r, Brl-04ur, Cs-qr10, Cs-qr10_firmware, Cs-qr20, Cs-qr20_firmware, Cs-w50hd, Cs-w50hd_firmware, Cs-wmv02g
2023-02-22
N/A
8.8 HIGH
** UNSUPPORTED WHEN ASSIGNED ** Cross-site request forgery (CSRF) vulnerability in Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G all versions allows a remote unauthenticated attacker to hijack the authentication and conduct arbitrary operations by having a logged-in user to view a malicious page. NOTE: This vulnerability only affects products that are no longer supported by the developer.
Big-ip_b2250_firmware, Big-ip_b2250, Big-ip_b4300_firmware, Big-ip_b4300, Big-ip_b4340n_firmware, Big-ip_b4340n, Big-ip_b4450n_firmware, Big-ip_b4450n, Big-ip_10000s_firmware, Big-ip_10000s
2023-02-09
N/A
9.9 CRITICAL
In BIG-IP starting in versions 17.0.0, 16.1.2.2, 15.1.5.1, 14.1.4.6, and 13.1.5 on their respective branches, a format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Conprosys_hmi_system, Cps-mc341-a1-111, Cps-mc341-a1-111_firmware, Cps-mc341-adsc1-111, Cps-mc341-adsc1-111_firmware, Cps-mc341-adsc1-931, Cps-mc341-adsc1-931_firmware, Cps-mc341-adsc2-111, Cps-mc341-adsc2-111_firmware, Cps-mc341-ds1-111
2023-01-26
N/A
5.4 MEDIUM
Cross-site scripting vulnerability in CONPROSYS HMI System (CHS) Ver.3.4.5 and earlier allows a remote authenticated attacker to inject an arbitrary script and obtain the sensitive information.
Brl-04cw, Brl-04r, Brl-04ur, Cs-qr10, Cs-qr10_firmware, Cs-qr20, Cs-qr20_firmware, Cs-w50hd, Cs-w50hd_firmware, Cs-wmv02g
2023-02-22
N/A
5.2 MEDIUM
** UNSUPPORTED WHEN ASSIGNED ** Stored cross-site scripting vulnerability in Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G all versions allows a network-adjacent authenticated attacker to inject an arbitrary script. NOTE: This vulnerability only affects products that are no longer supported by the developer.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-25011. Reason: This candidate is a duplicate of CVE-2023-25011. Notes: All CVE users should reference CVE-2023-25011 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Camera_assistant, Edwrc-2533gst2, Edwrc-2533gst2_firmware, Lan-w300n/dr, Lan-w300n/dr_firmware, Lan-w300n/p, Lan-w300n/p_firmware, Lan-w300n/pr5, Lan-w300n/pr5_firmware, Lan-w300n/rs
2023-02-23
N/A
7.8 HIGH
Untrusted search path vulnerability in ELECOM Camera Assistant 1.00 and QuickFileDealer Ver.1.2.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Ichiran App for iOS versions prior to 3.1.0 and Ichiran App for Android versions prior to 3.1.0 improperly verify server certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.
Cj1w-eip21, Cj1w-eip21_firmware, Cj2h-cpu64, Cj2h-cpu64-eip, Cj2h-cpu64-eip_firmware, Cj2h-cpu64_firmware, Cj2h-cpu65, Cj2h-cpu65-eip, Cj2h-cpu65-eip_firmware, Cj2h-cpu65_firmware
2023-01-24
N/A
7.8 HIGH
CX-Motion-MCH v2.32 and earlier contains an access of uninitialized pointer vulnerability. Having a user to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.
2023-02-24
N/A
7.5 HIGH
SUSHIRO App for Android outputs sensitive information to the log file, which may result in an attacker obtaining a credential information from the log file. Affected products/versions are as follows: SUSHIRO Ver.4.0.31, Thailand SUSHIRO Ver.1.0.0, Hong Kong SUSHIRO Ver.3.0.2, Singapore SUSHIRO Ver.2.0.0, and Taiwan SUSHIRO Ver.2.0.1