Filtered by vendor Keysight
Subscribe
Total
10 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-1860 | 1 Keysight | 1 Hawkeye | 2024-05-17 | 4.0 MEDIUM | 6.1 MEDIUM |
A vulnerability was found in Keysight IXIA Hawkeye 3.3.16.28. It has been declared as problematic. This vulnerability affects unknown code of the file /licenses. The manipulation of the argument view with the input teste"><script>alert(%27c4ng4c3ir0%27)</script> leads to cross site scripting. The attack can be initiated remotely. VDB-224998 is the identifier assigned to this vulnerability. NOTE: Vendor did not respond if and how they may handle this issue. | |||||
CVE-2023-34394 | 1 Keysight | 1 Geolocation Server | 2024-02-05 | N/A | 7.8 HIGH |
In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition. | |||||
CVE-2023-36853 | 1 Keysight | 1 Geolocation Server | 2024-02-05 | N/A | 7.8 HIGH |
?In Keysight Geolocation Server v2.4.2 and prior, a low privileged attacker could create a local ZIP file containing a malicious script in any location. The attacker could abuse this to load a DLL with SYSTEM privileges. | |||||
CVE-2023-1967 | 1 Keysight | 1 N8844a | 2024-02-04 | N/A | 9.8 CRITICAL |
Keysight N8844A Data Analytics Web Service deserializes untrusted data without sufficiently verifying the resulting data will be valid. | |||||
CVE-2022-38129 | 1 Keysight | 1 Sensor Management Server | 2024-02-04 | N/A | 9.8 CRITICAL |
A path traversal vulnerability exists in the com.keysight.tentacle.licensing.LicenseManager.addLicenseFile() method in the Keysight Sensor Management Server (SMS). This allows an unauthenticated remote attacker to upload arbitrary files to the SMS host. | |||||
CVE-2022-38130 | 1 Keysight | 1 Sensor Management Server | 2024-02-04 | N/A | 9.8 CRITICAL |
The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<attacker-host>\sms\<attacker-db.zip>), effectively controlling the content of the database to be restored. | |||||
CVE-2022-1660 | 1 Keysight | 4 N6841a Rf, N6841a Rf Firmware, N6854a and 1 more | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
The affected products are vulnerable of untrusted data due to deserialization without prior authorization/authentication, which may allow an attacker to remotely execute arbitrary code. | |||||
CVE-2022-1661 | 1 Keysight | 4 N6841a Rf, N6841a Rf Firmware, N6854a and 1 more | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files. | |||||
CVE-2020-35122 | 1 Keysight | 1 Keysight Database Connector | 2024-02-04 | 4.0 MEDIUM | 7.5 HIGH |
An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could bypass the access controls for using a saved database connection profile to submit arbitrary SQL against a saved database connection. | |||||
CVE-2020-35121 | 1 Keysight | 1 Database Connector | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could insert arbitrary JavaScript into saved macro parameters that would execute when a user viewed a page with that instance of the macro. |