Lucene search

K
MilesightMilesightvpn

6 matches found

CVE
CVE
added 2023/07/06 3:15 p.m.36 views

CVE-2023-22844

An authentication bypass vulnerability exists in the requestHandlers.js verifyToken functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to authentication bypass. An attacker can send a network request to trigger this vulnerability.

9.8CVSS9.5AI score0.00027EPSS
CVE
CVE
added 2023/07/06 3:15 p.m.35 views

CVE-2023-22319

A sql injection vulnerability exists in the requestHandlers.js LoginAuth functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to authentication bypass. An attacker can send a malicious packet to trigger this vulnerability.

9.8CVSS9.5AI score0.00024EPSS
CVE
CVE
added 2023/07/06 3:15 p.m.31 views

CVE-2023-23907

A directory traversal vulnerability exists in the server.js start functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to arbitrary file read. An attacker can send a network request to trigger this vulnerability.

7.5CVSS8.6AI score0.00239EPSS
CVE
CVE
added 2023/07/06 3:15 p.m.29 views

CVE-2023-24497

Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploit...

4.7CVSS7.1AI score0.00111EPSS
CVE
CVE
added 2023/07/06 3:15 p.m.26 views

CVE-2023-22371

An os command injection vulnerability exists in the liburvpn.so create_private_key functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to command execution. An attacker can send a malicious packet to trigger this vulnerability.

8.1CVSS9.1AI score0.00248EPSS
CVE
CVE
added 2023/07/06 3:15 p.m.23 views

CVE-2023-24496

Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploit...

4.7CVSS7.1AI score0.00111EPSS