Auto-merge PR#8361

Auto-merge PR#8361
This commit is contained in:
CVE Team 2022-12-22 18:55:36 -05:00 committed by GitHub
commit d4dea654fe
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
11 changed files with 22 additions and 22 deletions

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_authorized_keys/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_authorized_keys/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_xml_file/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_xml_file/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_file/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_file/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_aaa_cert_file/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_aaa_cert_file/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_nodejs_app/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_nodejs_app/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_firmware/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_firmware/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_https_cert_file/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_https_cert_file/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_sdk_file/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_sdk_file/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_e2c_json_file/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_e2c_json_file/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_wireguard_cert_file/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_wireguard_cert_file/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}

View File

@ -12,7 +12,7 @@
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_cert_file/` API is affected by command injection vulnerability."
"value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_cert_file/` API."
}
]
},
@ -39,7 +39,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"value": "CWE-125: Out-of-bounds Read"
}
]
}