Vulnerabilities (CVE)

Filtered by CWE-291
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-34202 1 Vasion 2 Virtual Appliance Application, Virtual Appliance Host 2025-09-24 N/A 8.8 HIGH
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 25.2.169 and Application prior to 25.2.1518 (VA and SaaS deployments) expose Docker internal networks in a way that allows an attacker on the same external L2 segment — or an attacker able to add routes using the appliance as a gateway — to reach container IPs directly. This grants access to internal services (HTTP APIs, Redis, MySQL, etc.) that are intended to be isolated inside the container network. Many of those services are accessible without authentication or are vulnerable to known exploitation chains. As a result, compromise of a single reachable endpoint or basic network access can enable lateral movement, remote code execution, data exfiltration, and full system compromise.
CVE-2022-46415 1 Dji 2 Spark, Spark Firmware 2025-02-19 N/A 9.1 CRITICAL
DJI Spark 01.00.0900 allows remote attackers to prevent legitimate terminal connections by exhausting the DHCP IP address pool. To accomplish this, the attacker would first need to connect to the device's internal Wi-Fi network (e.g., by guessing the password). Then, the attacker would need to send many DHCP request packets.
CVE-2024-23309 1 Level1 2 Wbr-6012, Wbr-6012 Firmware 2024-11-21 N/A 9.0 CRITICAL
The LevelOne WBR-6012 router with firmware R0.40e6 has an authentication bypass vulnerability in its web application due to reliance on client IP addresses for authentication. Attackers could spoof an IP address to gain unauthorized access without needing a session token.
CVE-2023-35906 2 Ibm, Linux 2 Aspera Faspex, Linux Kernel 2024-11-21 N/A 5.3 MEDIUM
IBM Aspera Faspex 5.0.5 could allow a remote attacked to bypass IP restrictions due to improper access controls. IBM X-Force ID: 259649.
CVE-2024-32765 2024-08-12 N/A 4.2 MEDIUM
A vulnerability has been reported to affect Network & Virtual Switch. If exploited, the vulnerability could allow local authenticated administrators to gain access to and execute certain functions via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later