ID | CVSS | Summary | Last (major) update | Published | |
CVE-2022-42897 | None |
Array Networks AG/vxAG with ArrayOS AG before 9.4.0.469 allows unauthenticated command injection that leads to privilege escalation and control of the system. NOTE: ArrayOS AG 10.x is unaffected.
|
21-11-2024 - 07:25 | 13-10-2022 - 00:15 | |
CVE-2023-24613 | None |
The user interface of Array Networks AG Series and vxAG through 9.4.0.470 could allow a remote attacker to use the gdb tool to overwrite the backend function call stack after accessing the system with administrator privileges. A successful exploit co
|
21-11-2024 - 07:48 | 03-02-2023 - 02:15 | |
CVE-2023-28461 | None |
Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be expl
|
26-11-2024 - 02:00 | 15-03-2023 - 23:15 | |
CVE-2023-51707 | None |
MotionPro in Array ArrayOS AG before 9.4.0.505 on AG and vxAG allows remote command execution via crafted packets. AG and vxAG 9.3.0.259.x are unaffected.
|
21-11-2024 - 08:38 | 22-12-2023 - 02:15 | |
CVE-2023-41121 | None |
Array AG OS before 9.4.0.499 allows denial of service: remote attackers can cause system service processes to crash through abnormal HTTP operations.
|
21-11-2024 - 08:20 | 25-08-2023 - 22:15 |