Show filters
1,080 Total Results
Displaying 101-110 of 1,080
Sort by:
Attacker Value
Unknown

CVE-2024-45453

Disclosure Date: September 23, 2024 (last updated February 26, 2025)
Authentication Bypass by Spoofing vulnerability in Peter Hardy-vanDoorn Maintenance Redirect allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maintenance Redirect: from n/a through 2.0.1.
0
Attacker Value
Unknown

CVE-2023-30464

Disclosure Date: September 18, 2024 (last updated February 26, 2025)
CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack.
0
Attacker Value
Unknown

CVE-2024-8287

Disclosure Date: September 18, 2024 (last updated February 26, 2025)
Anbox Management Service, in versions 1.17.0 through 1.23.0, does not validate the TLS certificate provided to it by the Anbox Stream Agent. An attacker must be able to machine-in-the-middle the Anbox Stream Agent from within an internal network before they can attempt to take advantage of this.
Attacker Value
Unknown

CVE-2024-39081

Disclosure Date: September 18, 2024 (last updated February 26, 2025)
An issue in SMART TYRE CAR & BIKE v4.2.0 allows attackers to perform a man-in-the-middle attack via Bluetooth communications.
Attacker Value
Unknown

CVE-2024-43099

Disclosure Date: September 13, 2024 (last updated February 26, 2025)
The session hijacking attack targets the application layer's control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to maintain security. However, if an attacker captures this session key, they can inject traffic into an ongoing authenticated session. To successfully achieve this, the attacker also needs to spoof both the IP address and MAC address of the originating host which is typical of a session-based attack.
0
Attacker Value
Unknown

CVE-2024-6678

Disclosure Date: September 12, 2024 (last updated February 26, 2025)
An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances.
Attacker Value
Unknown

CVE-2024-8096

Disclosure Date: September 11, 2024 (last updated February 26, 2025)
When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
0
Attacker Value
Unknown

CVE-2024-44104

Disclosure Date: September 10, 2024 (last updated February 26, 2025)
An incorrectly implemented authentication scheme that is subjected to a spoofing attack in the management console of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to escalate their privileges.
Attacker Value
Unknown

CVE-2024-31489

Disclosure Date: September 10, 2024 (last updated February 26, 2025)
AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation
Attacker Value
Unknown

CVE-2022-45856

Disclosure Date: September 10, 2024 (last updated February 26, 2025)
An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and  both the service provider and the identity provider.