

#Xerox print driver 4.9.0 download for mac code
This leads to a crash or potential code execution during GPG signature verification.ĬNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2Īrista DCS-7050QX-32S-R 4.20.9M, DCS-7050CX3-32S-R 4.20.11M, and DCS-7280SRAM-48C6-R 4.22.0.1F devices (and possibly other products) allow attackers to bypass intended TACACS+ shell restrictions via a | character. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. This may happen by directly connecting to a device if it is directly exposed to an attacker. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges.

Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. This program fails to properly sanitize the username parameter that is passed to it. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the user_id field in a cookie.ĭanfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled. An attacker could use this access to create a new user account or control the issue was discovered in EyesOfNetwork eonweb 5.1 through 5.3 before 5.3-3. A vulnerability in the authentication functionality in the web-based interface could allow an unauthenticated remote attacker to capture packets at the time of authentication and gain access to the cleartext password. Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an attacker to sniff and spoof beacon requests remotely.įasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br. (aka anteros-core).įasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to. (aka ibatis-sqlmap).įasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to. (aka shaded hikari-config).Īn issue was discovered on HUMAX HGA12R-02 BRGCAA 1.1.53 devices. The Java RMI Server has an Insecure Default Configuration, leading to Java Code Execution from a remote URL because an RMI Distributed Garbage Collector method is called. An issue was discovered in UNCTAD ASYCUDA World 2001 through 2020.
