3 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

Furukawa Electric LatAm 423-41W/AC before v1.1.4 and LD421-21W before v1.3.3 were discovered to contain an HTML injection vulnerability via the serial number update function. • https://cwe.mitre.org/data/definitions/79.html https://gist.githubusercontent.com/LuigiPolidorio/ec78daac7c3d97966f2e3703ca5d1685/raw/d64a487407d6f9685d3907206954a6c84c6fa621/reference.txt https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/11-Client-side_Testing/03-Testing_for_HTML_Injection https://www.softwall.com.br/cves/publicacao-rce-html-injection-furukawa • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 8EXPL: 0

RCE (Remote Code Execution) vulnerability was found in some Furukawa ONU models, this vulnerability allows remote unauthenticated users to send arbitrary commands to the device via web interface. • https://cwe.mitre.org/data/definitions/94.html https://gist.githubusercontent.com/LuigiPolidorio/9fe61cf2edee63152161ffc52c39f6cd/raw/529cf49103e0fdf4eeb970fa1f62fa508ebe7c3c/reference.txt https://owasp.org/www-community/attacks/Code_Injection https://www.softwall.com.br/cves/publicacao-rce-html-injection-furukawa • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 5%CPEs: 9EXPL: 0

Multiple unspecified vulnerabilities in multiple FITELnet products, including FITELnet-F40, F80, F100, F120, F1000, and E20/E30, allow remote attackers to cause a denial of service via crafted DNS messages that trigger errors in (1) ProxyDNS or (2) PKI-Resolver, as demonstrated by the OUSPG PROTOS DNS test suite. • http://secunia.com/advisories/19820 http://www.furukawa.co.jp/fitelnet/topic/dns2_attacks.html http://www.kb.cert.org/vuls/id/955777 http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en http://www.securityfocus.com/bid/17710 http://www.vupen.com/english/advisories/2006/1505 http://www.vupen.com/english/advisories/2006/1536 https://exchange.xforce.ibmcloud.com/vulnerabilities/26081 •