|
222501
|
9.8 |
CRITICAL
Network
|
ixpdata
|
easyinstall
|
In IXP EasyInstall 6.2.13723, there is Remote Code Execution via the Agent Service. An unauthenticated attacker can communicate with the Agent Service over TCP port 20051, and execute code in the NT …
|
CWE-78
OS Command
|
CVE-2019-19897
|
2024-11-21 13:35 |
2020-01-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
222502
|
9.9 |
CRITICAL
Network
|
ixpdata
|
easyinstall
|
In IXP EasyInstall 6.2.13723, there is Remote Code Execution via weak permissions on the Engine Service share. The default file permissions of the IXP$ share on the server allows modification of dire…
|
CWE-276
Incorrect Default Permissions
|
CVE-2019-19896
|
2024-11-21 13:35 |
2020-01-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
222503
|
7.8 |
HIGH
Local
|
ixpdata
|
easyinstall
|
In IXP EasyInstall 6.2.13723, there is Lateral Movement (using the Agent Service) against other users on a client system. An authenticated attacker can, by modifying %SYSTEMDRIVE%\IXP\SW\[PACKAGE_COD…
|
CWE-732
Incorrect Permission Assignment for Critical Resource
|
CVE-2019-19895
|
2024-11-21 13:35 |
2020-01-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
222504
|
5.5 |
MEDIUM
Local
|
ixpdata
|
easyinstall
|
In IXP EasyInstall 6.2.13723, it is possible to temporarily disable UAC by using the Agent Service on a client system. An authenticated attacker (non-admin) can disable UAC for other users by renamin…
|
CWE-732
Incorrect Permission Assignment for Critical Resource
|
CVE-2019-19894
|
2024-11-21 13:35 |
2020-01-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
222505
|
7.5 |
HIGH
Network
|
ixpdata
|
easyinstall
|
In IXP EasyInstall 6.2.13723, there is Directory Traversal on TCP port 8000 via the Engine Service by an unauthenticated attacker, who can access the server's filesystem with the access rights of NT …
|
CWE-22
Path Traversal
|
CVE-2019-19893
|
2024-11-21 13:35 |
2020-01-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
222506
|
9.8 |
CRITICAL
Network
|
ruckuswireless
|
unleashed zonedirector_1200_firmware
|
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=import-category to admin/_cmdstat.jsp via the uploa…
|
CWE-78
OS Command
|
CVE-2019-19839
|
2024-11-21 13:35 |
2020-01-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
222507
|
9.8 |
CRITICAL
Network
|
ruckuswireless
|
unleashed zonedirector_1200_firmware
|
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=get-platform-depends to admin/_cmdstat.jsp via the …
|
CWE-78
OS Command
|
CVE-2019-19838
|
2024-11-21 13:35 |
2020-01-24 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
222508
|
5.3 |
MEDIUM
Network
|
ruckuswireless
|
unleashed zonedirector_1200_firmware
|
Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote information disclosure of bin/web.conf via HTTP requests.
|
NVD-CWE-noinfo
|
CVE-2019-19837
|
2024-11-21 13:35 |
2020-01-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
222509
|
7.5 |
HIGH
Network
|
ruckuswireless
|
unleashed zonedirector_1200_firmware
|
SSRF in AjaxRestrictedCmdStat in zap in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote denial of service via the server attribute to the tools/_rcmdstat.jsp URI.
|
CWE-918
Server-Side Request Forgery (SSRF)
|
CVE-2019-19835
|
2024-11-21 13:35 |
2020-01-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
222510
|
9.8 |
CRITICAL
Network
|
ruckuswireless
|
unleashed zonedirector_1200_firmware
|
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=spectra-analysis to admin/_cmdstat.jsp via the mac …
|
CWE-78
OS Command
|
CVE-2019-19842
|
2024-11-21 13:35 |
2020-01-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|