2022-08-10
|
CVE-2022-36325
|
Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS.
|
Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_sc622\-2c_firmware, Scalance_sc632\-2c_firmware, Scalance_sc636\-2c_firmware, Scalance_sc642\-2c_firmware, Scalance_sc646\-2c_firmware, Scalance_sc\-600_firmware, Scalance_w700_ieee_802\.11ac_firmware, Scalance_w700_ieee_802\.11ax_firmware, Scalance_w700_ieee_802\.11n_firmware, Scalance_xb205\-3_firmware, Scalance_xb205\-3ld_firmware, Scalance_xb208_firmware, Scalance_xb213\-3_firmware, Scalance_xb213\-3ld_firmware, Scalance_xb216_firmware, Scalance_xb\-200_firmware, Scalance_xc206\-2_firmware, Scalance_xc206\-2g_poe__firmware, Scalance_xc206\-2g_poe_eec_firmware, Scalance_xc206\-2sfp_eec_firmware, Scalance_xc206\-2sfp_g_\(E\/ip\)_firmware, Scalance_xc206\-2sfp_g_eec_firmware, Scalance_xc206\-2sfp_g_firmware, Scalance_xc208_firmware, Scalance_xc208eec_firmware, Scalance_xc208g_\(E\/ip\)_firmware, Scalance_xc208g_eec_firmware, Scalance_xc208g_firmware, Scalance_xc208g_poe_firmware, Scalance_xc216\-4c_firmware, Scalance_xc216\-4c_g_\(E\/ip\)_firmware, Scalance_xc216\-4c_g_eec_firmware, Scalance_xc216\-4c_g_firmware, Scalance_xc216_firmware, Scalance_xc216eec_firmware, Scalance_xc224\-4c_g_\(E\/ip\)_firmware, Scalance_xc224\-4c_g__firmware, Scalance_xc224\-4c_g_eec_firmware, Scalance_xc224__firmware, Scalance_xc\-200_firmware, Scalance_xf204\-2ba_dna_firmware, Scalance_xf204\-2ba_irt_firmware, Scalance_xf\-200ba_firmware, Scalance_xm400_firmware, Scalance_xm408\-4c_firmware, Scalance_xm408\-4c_l3_firmware, Scalance_xm408\-8c_firmware, Scalance_xm408\-8c_l3_firmware, Scalance_xm416\-4c_firmware, Scalance_xm416\-4c_l3_firmware, Scalance_xp208_\(Eip\)_firmware, Scalance_xp208_firmware, Scalance_xp208eec_firmware, Scalance_xp208poe_eec_firmware, Scalance_xp216_\(Eip\)_firmware, Scalance_xp216_firmware, Scalance_xp216eec_firmware, Scalance_xp216poe_eec_firmware, Scalance_xp\-200_firmware, Scalance_xr324\-12m_firmware, Scalance_xr324\-12m_ts_firmware, Scalance_xr324\-4m_eec_firmware, Scalance_xr324\-4m_poe_firmware, Scalance_xr324\-4m_poe_ts_firmware, Scalance_xr324wg_firmware, Scalance_xr326\-2c_poe_wg_firmware, Scalance_xr328\-4c_wg_firmware, Scalance_xr500_firmware, Scalance_xr524\-8c_firmware, Scalance_xr524\-8c_l3_firmware, Scalance_xr524_firmware, Scalance_xr526\-8c_firmware, Scalance_xr526\-8c_l3_firmware, Scalance_xr526_firmware, Scalance_xr528\-6m_2hr2_firmware, Scalance_xr528\-6m_2hr2_l3_firmware, Scalance_xr528\-6m_firmware, Scalance_xr528\-6m_l3_firmware, Scalance_xr528_firmware, Scalance_xr552\-12_firmware, Scalance_xr552\-12m_2hr2_firmware, Scalance_xr552\-12m_2hr2_l3_firmware, Scalance_xr552\-12m_firmware, Scalance_xr552_firmware, Scalance_xr\-300_firmware, Scalance_xr\-300eec_firmware, Scalance_xr\-300poe_firmware, Scalance_xr\-300wg_firmware
|
4.8
|
|
|
2022-08-10
|
CVE-2022-36323
|
Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.
|
Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_sc622\-2c_firmware, Scalance_sc632\-2c_firmware, Scalance_sc636\-2c_firmware, Scalance_sc642\-2c_firmware, Scalance_sc646\-2c_firmware, Scalance_sc\-600_firmware, Scalance_w700_ieee_802\.11ac_firmware, Scalance_w700_ieee_802\.11ax_firmware, Scalance_w700_ieee_802\.11n_firmware, Scalance_xb205\-3_firmware, Scalance_xb205\-3ld_firmware, Scalance_xb208_firmware, Scalance_xb213\-3_firmware, Scalance_xb213\-3ld_firmware, Scalance_xb216_firmware, Scalance_xb\-200_firmware, Scalance_xc206\-2_firmware, Scalance_xc206\-2g_poe__firmware, Scalance_xc206\-2g_poe_eec_firmware, Scalance_xc206\-2sfp_eec_firmware, Scalance_xc206\-2sfp_g_\(E\/ip\)_firmware, Scalance_xc206\-2sfp_g_eec_firmware, Scalance_xc206\-2sfp_g_firmware, Scalance_xc208_firmware, Scalance_xc208eec_firmware, Scalance_xc208g_\(E\/ip\)_firmware, Scalance_xc208g_eec_firmware, Scalance_xc208g_firmware, Scalance_xc208g_poe_firmware, Scalance_xc216\-4c_firmware, Scalance_xc216\-4c_g_\(E\/ip\)_firmware, Scalance_xc216\-4c_g_eec_firmware, Scalance_xc216\-4c_g_firmware, Scalance_xc216_firmware, Scalance_xc216eec_firmware, Scalance_xc224\-4c_g_\(E\/ip\)_firmware, Scalance_xc224\-4c_g__firmware, Scalance_xc224\-4c_g_eec_firmware, Scalance_xc224__firmware, Scalance_xc\-200_firmware, Scalance_xf204\-2ba_dna_firmware, Scalance_xf204\-2ba_irt_firmware, Scalance_xf\-200ba_firmware, Scalance_xm400_firmware, Scalance_xm408\-4c_firmware, Scalance_xm408\-4c_l3_firmware, Scalance_xm408\-8c_firmware, Scalance_xm408\-8c_l3_firmware, Scalance_xm416\-4c_firmware, Scalance_xm416\-4c_l3_firmware, Scalance_xp208_\(Eip\)_firmware, Scalance_xp208_firmware, Scalance_xp208eec_firmware, Scalance_xp208poe_eec_firmware, Scalance_xp216_\(Eip\)_firmware, Scalance_xp216_firmware, Scalance_xp216eec_firmware, Scalance_xp216poe_eec_firmware, Scalance_xp\-200_firmware, Scalance_xr324\-12m_firmware, Scalance_xr324\-12m_ts_firmware, Scalance_xr324\-4m_eec_firmware, Scalance_xr324\-4m_poe_firmware, Scalance_xr324\-4m_poe_ts_firmware, Scalance_xr324wg_firmware, Scalance_xr326\-2c_poe_wg_firmware, Scalance_xr328\-4c_wg_firmware, Scalance_xr500_firmware, Scalance_xr524\-8c_firmware, Scalance_xr524\-8c_l3_firmware, Scalance_xr524_firmware, Scalance_xr526\-8c_firmware, Scalance_xr526\-8c_l3_firmware, Scalance_xr526_firmware, Scalance_xr528\-6m_2hr2_firmware, Scalance_xr528\-6m_2hr2_l3_firmware, Scalance_xr528\-6m_firmware, Scalance_xr528\-6m_l3_firmware, Scalance_xr528_firmware, Scalance_xr552\-12_firmware, Scalance_xr552\-12m_2hr2_firmware, Scalance_xr552\-12m_2hr2_l3_firmware, Scalance_xr552\-12m_firmware, Scalance_xr552_firmware, Scalance_xr\-300_firmware, Scalance_xr\-300eec_firmware, Scalance_xr\-300poe_firmware, Scalance_xr\-300wg_firmware
|
9.1
|
|
|
2022-08-10
|
CVE-2022-36324
|
Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.
|
Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_w700_ieee_802\.11ac_firmware, Scalance_w700_ieee_802\.11ax_firmware, Scalance_w700_ieee_802\.11n_firmware, Scalance_xb205\-3_firmware, Scalance_xb205\-3ld_firmware, Scalance_xb208_firmware, Scalance_xb213\-3_firmware, Scalance_xb213\-3ld_firmware, Scalance_xb216_firmware, Scalance_xb\-200_firmware, Scalance_xc206\-2_firmware, Scalance_xc206\-2g_poe__firmware, Scalance_xc206\-2g_poe_eec_firmware, Scalance_xc206\-2sfp_eec_firmware, Scalance_xc206\-2sfp_g_\(E\/ip\)_firmware, Scalance_xc206\-2sfp_g_eec_firmware, Scalance_xc206\-2sfp_g_firmware, Scalance_xc208_firmware, Scalance_xc208eec_firmware, Scalance_xc208g_\(E\/ip\)_firmware, Scalance_xc208g_eec_firmware, Scalance_xc208g_firmware, Scalance_xc208g_poe_firmware, Scalance_xc216\-4c_firmware, Scalance_xc216\-4c_g_\(E\/ip\)_firmware, Scalance_xc216\-4c_g_eec_firmware, Scalance_xc216\-4c_g_firmware, Scalance_xc216_firmware, Scalance_xc216eec_firmware, Scalance_xc224\-4c_g_\(E\/ip\)_firmware, Scalance_xc224\-4c_g__firmware, Scalance_xc224\-4c_g_eec_firmware, Scalance_xc224__firmware, Scalance_xc\-200_firmware, Scalance_xf204\-2ba_dna_firmware, Scalance_xf204\-2ba_irt_firmware, Scalance_xf\-200ba_firmware, Scalance_xm400_firmware, Scalance_xm408\-4c_firmware, Scalance_xm408\-4c_l3_firmware, Scalance_xm408\-8c_firmware, Scalance_xm408\-8c_l3_firmware, Scalance_xm416\-4c_firmware, Scalance_xm416\-4c_l3_firmware, Scalance_xp208_\(Eip\)_firmware, Scalance_xp208_firmware, Scalance_xp208eec_firmware, Scalance_xp208poe_eec_firmware, Scalance_xp216_\(Eip\)_firmware, Scalance_xp216_firmware, Scalance_xp216eec_firmware, Scalance_xp216poe_eec_firmware, Scalance_xp\-200_firmware, Scalance_xr324\-12m_firmware, Scalance_xr324\-12m_ts_firmware, Scalance_xr324\-4m_eec_firmware, Scalance_xr324\-4m_poe_firmware, Scalance_xr324\-4m_poe_ts_firmware, Scalance_xr324wg_firmware, Scalance_xr326\-2c_poe_wg_firmware, Scalance_xr328\-4c_wg_firmware, Scalance_xr500_firmware, Scalance_xr524\-8c_firmware, Scalance_xr524\-8c_l3_firmware, Scalance_xr524_firmware, Scalance_xr526\-8c_firmware, Scalance_xr526\-8c_l3_firmware, Scalance_xr526_firmware, Scalance_xr528\-6m_2hr2_firmware, Scalance_xr528\-6m_2hr2_l3_firmware, Scalance_xr528\-6m_firmware, Scalance_xr528\-6m_l3_firmware, Scalance_xr528_firmware, Scalance_xr552\-12_firmware, Scalance_xr552\-12m_2hr2_firmware, Scalance_xr552\-12m_2hr2_l3_firmware, Scalance_xr552\-12m_firmware, Scalance_xr552_firmware, Scalance_xr\-300_firmware, Scalance_xr\-300eec_firmware, Scalance_xr\-300poe_firmware, Scalance_xr\-300wg_firmware
|
7.5
|
|
|
2021-05-11
|
CVE-2020-26144
|
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
|
C\-100_firmware, C\-110_firmware, C\-120_firmware, C\-130_firmware, C\-200_firmware, C\-230_firmware, C\-235_firmware, C\-250_firmware, C\-260_firmware, C\-65_firmware, C\-75_firmware, O\-105_firmware, O\-90_firmware, W\-118_firmware, W\-68_firmware, Galaxy_i9305_firmware, Scalance_w700_ieee_802\.11ax_firmware, Scalance_w700_ieee_802\.11n_firmware
|
6.5
|
|
|