CVE-2023-45227
- EPSS 0.1%
- Published 06.02.2024 22:16:14
- Last modified 21.11.2024 08:26:35
An attacker with access to the web application with vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "dns.0.server" parameter.
- EPSS 0.1%
- Published 06.02.2024 22:16:14
- Last modified 21.11.2024 08:27:16
A potential attacker with access to the Westermo Lynx device may be able to execute malicious code that could affect the correct functioning of the device.
CVE-2023-40143
- EPSS 0.1%
- Published 06.02.2024 22:16:13
- Last modified 21.11.2024 08:18:51
An attacker with access to the Westermo Lynx web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "forward.0.domain" parameter.
CVE-2023-40544
- EPSS 0.02%
- Published 06.02.2024 22:16:13
- Last modified 21.11.2024 08:19:41
An attacker with access to the network where the affected devices are located could maliciously actions to obtain, via a sniffer, sensitive information exchanged via TCP communications.
CVE-2023-42765
- EPSS 0.07%
- Published 06.02.2024 22:16:13
- Last modified 21.11.2024 08:23:07
An attacker with access to the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "username" parameter in the SNMP configuration.
CVE-2023-45213
- EPSS 0.04%
- Published 06.02.2024 22:16:13
- Last modified 21.11.2024 08:26:33
A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device.
CVE-2023-45222
- EPSS 0.1%
- Published 06.02.2024 22:16:13
- Last modified 21.11.2024 08:26:34
An attacker with access to the web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "autorefresh" parameter.
CVE-2023-38579
- EPSS 0.07%
- Published 06.02.2024 22:16:12
- Last modified 21.11.2024 08:13:52
The cross-site request forgery token in the request may be predictable or easily guessable allowing attackers to craft a malicious request, which could be triggered by a victim unknowingly. In a successful CSRF attack, the attacker could...