Filtered by vendor Keysight
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-38129 | 1 Keysight | 1 Sensor Management Server | 2022-08-15 | N/A | 9.8 CRITICAL |
A path traversal vulnerability exists in the com.keysight.tentacle.licensing.LicenseManager.addLicenseFile() method in the Keysight Sensor Management Server (SMS). This allows an unauthenticated remote attacker to upload arbitrary files to the SMS host. | |||||
CVE-2022-38130 | 1 Keysight | 1 Sensor Management Server | 2022-08-15 | N/A | 9.8 CRITICAL |
The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<attacker-host>\sms\<attacker-db.zip>), effectively controlling the content of the database to be restored. | |||||
CVE-2022-1660 | 1 Keysight | 4 N6841a Rf, N6841a Rf Firmware, N6854a and 1 more | 2022-06-09 | 10.0 HIGH | 9.8 CRITICAL |
The affected products are vulnerable of untrusted data due to deserialization without prior authorization/authentication, which may allow an attacker to remotely execute arbitrary code. | |||||
CVE-2022-1661 | 1 Keysight | 4 N6841a Rf, N6841a Rf Firmware, N6854a and 1 more | 2022-06-09 | 5.0 MEDIUM | 7.5 HIGH |
The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files. | |||||
CVE-2020-35121 | 1 Keysight | 1 Database Connector | 2021-07-21 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could insert arbitrary JavaScript into saved macro parameters that would execute when a user viewed a page with that instance of the macro. | |||||
CVE-2020-35122 | 1 Keysight | 1 Keysight Database Connector | 2020-12-16 | 4.0 MEDIUM | 7.5 HIGH |
An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could bypass the access controls for using a saved database connection profile to submit arbitrary SQL against a saved database connection. |