Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
21 Nov 2024, 07:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-xss-vulnerability-and-post-authentication-command-injection-vulnerability-in-firewalls - Vendor Advisory |
29 Dec 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The cross-site scripting (XSS) vulnerability in Zyxel ATP series firmware versions 4.32 through 5.35, USG FLEX series firmware versions 4.50 through 5.35, USG FLEX 50(W) firmware versions 4.16 through 5.35, USG20(W)-VPN firmware versions 4.16 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow an authenticated attacker with administrator privileges to store malicious scripts in a vulnerable device. A successful XSS attack could then result in the stored malicious scripts being executed when the user visits the Logs page of the GUI on the device. |
13 Jun 2023, 13:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* |
|
First Time |
Zyxel usg Flex 50 Firmware
Zyxel usg 20w-vpn Firmware |
07 Jun 2023, 18:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* |
03 May 2023, 15:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
CWE | CWE-79 | |
First Time |
Zyxel usg Flex 100
Zyxel atp100w Firmware Zyxel vpn100 Zyxel atp200 Zyxel usg Flex 50w Zyxel Zyxel usg Flex 700 Zyxel usg Flex 50w Firmware Zyxel atp200 Firmware Zyxel atp500 Zyxel usg Flex 100 Firmware Zyxel usg Flex 200 Zyxel vpn300 Firmware Zyxel vpn300 Zyxel usg20-vpn Zyxel usg20-vpn Firmware Zyxel vpn50 Zyxel atp700 Firmware Zyxel usg 20w-vpn Zyxel atp100w Zyxel usg Flex 100w Zyxel atp800 Zyxel usg Flex 50 Zyxel atp100 Zyxel vpn50 Firmware Zyxel usg Flex 50 Firmware Zyxel usg Flex 500 Zyxel vpn1000 Firmware Zyxel atp500 Firmware Zyxel usg Flex 200 Firmware Zyxel atp700 Zyxel usg 20w-vpn Firmware Zyxel atp800 Firmware Zyxel atp100 Firmware Zyxel usg Flex 500 Firmware Zyxel usg Flex 700 Firmware Zyxel vpn100 Firmware Zyxel usg Flex 100w Firmware Zyxel vpn1000 |
|
CPE | cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-xss-vulnerability-and-post-authentication-command-injection-vulnerability-in-firewalls - Vendor Advisory |
24 Apr 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2023-04-24 18:15
Updated : 2024-11-21 07:53
NVD link : CVE-2023-27990
Mitre link : CVE-2023-27990
CVE.ORG link : CVE-2023-27990
JSON object : View
zyxel
- atp200
- usg_flex_700
- atp500
- usg_flex_50w
- atp700
- vpn300_firmware
- vpn50
- usg_flex_500
- usg_flex_100w
- atp800_firmware
- usg_flex_200
- usg20-vpn_firmware
- atp100
- vpn100
- usg_flex_100_firmware
- atp800
- usg_flex_50w_firmware
- atp100w_firmware
- vpn1000_firmware
- atp100w
- vpn1000
- usg_flex_500_firmware
- usg_flex_50
- atp700_firmware
- vpn50_firmware
- usg_20w-vpn_firmware
- atp500_firmware
- usg20-vpn
- usg_flex_100
- usg_flex_50_firmware
- atp100_firmware
- usg_flex_700_firmware
- usg_flex_100w_firmware
- vpn100_firmware
- vpn300
- usg_flex_200_firmware
- usg_20w-vpn
- atp200_firmware
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')