3 results (0.001 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

03 May 2024 — A cross-site scripting (XSS) vulnerability in netis-systems MEX605 v2.00.06 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the getTimeZone function. Una vulnerabilidad de cross-site scripting (XSS) en netis-systems MEX605 v2.00.06 permite a los atacantes ejecutar scripts web o HTML arbitrarios a través de un payload manipulado inyectado en la función getTimeZone. • https://github.com/ymkyu/CVE/tree/main/CVE-2024-33791 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

03 May 2024 — netis-systems MEX605 v2.00.06 allows attackers to execute arbitrary OS commands via a crafted payload to the tracert page. Una vulnerabilidad de cross-site scripting (XSS) en netis-systems MEX605 v2.00.06 permite a los atacantes ejecutar scripts web o HTML arbitrarios a través de un payload manipulado inyectado en la página tracert. • https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

03 May 2024 — netis-systems MEX605 v2.00.06 allows attackers to execute arbitrary OS commands via a crafted payload to the ping test page. Una vulnerabilidad de cross-site scripting (XSS) en netis-systems MEX605 v2.00.06 permite a los atacantes ejecutar scripts web o HTML arbitrarios a través de un payload manipulado inyectado en la página de prueba de ping. • https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •