Lucene search

K

Keysight Technologies Security Vulnerabilities

cve
cve

CVE-2023-1399

N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected device’s default configuration and achieve remote code...

9.8CVSS

9.8AI Score

0.002EPSS

2023-03-27 04:15 PM
17
cve
cve

CVE-2023-36853

​In Keysight Geolocation Server v2.4.2 and prior, a low privileged attacker could create a local ZIP file containing a malicious script in any location. The attacker could abuse this to load a DLL with SYSTEM...

7.8CVSS

7.3AI Score

0.0005EPSS

2023-07-19 10:15 PM
19
cve
cve

CVE-2023-34394

In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service...

7.8CVSS

7.6AI Score

0.002EPSS

2023-07-19 10:15 PM
21
cve
cve

CVE-2022-38130

The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e.,...

9.8CVSS

9.4AI Score

0.004EPSS

2022-08-10 08:16 PM
30
6
cve
cve

CVE-2022-38129

A path traversal vulnerability exists in the com.keysight.tentacle.licensing.LicenseManager.addLicenseFile() method in the Keysight Sensor Management Server (SMS). This allows an unauthenticated remote attacker to upload arbitrary files to the SMS...

9.8CVSS

9.4AI Score

0.007EPSS

2022-08-10 08:16 PM
43
9