6/7/2023 0 Comments Usb network gate daemon removeVersions prior to 1.36.33 and 1.37.33 contain SQL Injection via malicious jason web token. ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. The resulting impact can include unauthorized data access (and modification), authentication and/or authorization bypass, and remote code execution. A user with the View or Edit permissions of Events may execute arbitrary SQL. The (blind) SQL Injection vulnerability is present within the `filter` query string parameter of the `/zm/index.php` endpoint. Versions prior to 1.36.33 and 1.37.33 are affected by a SQL Injection vulnerability. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33. TriggerOn ends up calling shell_exec using the supplied Id. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. This issue is patched in versions 1.36.33 and 1.37.33. This can be exploited by constructing paths like "././", which get replaced by "./". This is supposed to be mitigated by calling detaintPath, however dentaintPath does not properly sandbox the path. By controlling $view, any local file ending in. Versions prior to 1.36.33 and 1.37.33 contain a Local File Inclusion (Untrusted Search Path) vulnerability via /web/index.php. This issue is fixed in versions 1.36.33 and 1.37.33. The minTime and maxTime request parameters are not properly validated and could be used execute arbitrary SQL. Versions prior to 1.36.33 and 1.37.33 contain an SQL Injection. Versions prior to 1.36.33 and 1.37.33 contain a Local File Inclusion (Untrusted Search Path) vulnerability via web/ajax/modal.php, where an arbitrary php file path can be passed in the request and loaded. Any authenticated user can construct an api command to execute any shell command as the web user. Versions prior to 1.36.33 and 1.37.33 contain an OS Command Injection via daemonControl() in (/web/api/app/Controller/HostController.php). This flaw allows a local user to crash the system or potentially cause a denial of service. The message from user space is not checked properly before transferring into the device. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S10 20.2 versions prior to 20.2R3-S7 20.3 versions prior to 20.3R3-S6 20.4 versions prior to 20.4R3-S5 21.1 versions prior to 21.1R3-S4 21.2 versions prior to 21.2R3-S4 21.3 versions prior to 21.3R3-S3 21.4 versions prior to 21.4R3-S2 22.1 versions prior to 22.1R2-S2, 22.1R3 22.2 versions prior to 22.2R2, 22.2R3 22.3 versions prior to 22.3R1-S1, 22.3R2 22.4 versions prior to 22.4R2.Ī NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The device will continue to crash as long as the USB device is connected. When certain USB devices are connected to a USB port of the routing-engine (RE), the kernel will crash leading to a reboot of the device. Insecure Permissions vulnerability found in MagicJack A921 USB Phone Jack Rev 3.0 v.1.4 allows a physically proximate attacker to escalate privileges and gain access to sensitive information via the NAND flash memory.Īn Unexpected Status Code or Return Value vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated attacker with physical access to the device to cause a Denial of Service (DoS).
0 Comments
Leave a Reply. |