Show filters
1,099 Total Results
Displaying 121-130 of 1,099
Sort by:
Attacker Value
Unknown
CVE-2023-30464
Disclosure Date: September 18, 2024 (last updated February 26, 2025)
CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack.
0
Attacker Value
Unknown
CVE-2024-8287
Disclosure Date: September 18, 2024 (last updated February 26, 2025)
Anbox Management Service, in versions 1.17.0 through 1.23.0, does not validate the TLS certificate provided to it by the Anbox Stream Agent. An attacker must be able to machine-in-the-middle the Anbox Stream Agent from within an internal network before they can attempt to take advantage of this.
0
Attacker Value
Unknown
CVE-2024-39081
Disclosure Date: September 18, 2024 (last updated February 26, 2025)
An issue in SMART TYRE CAR & BIKE v4.2.0 allows attackers to perform a man-in-the-middle attack via Bluetooth communications.
0
Attacker Value
Unknown
CVE-2024-43099
Disclosure Date: September 13, 2024 (last updated February 26, 2025)
The session hijacking attack targets the application layer's control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to maintain security. However, if an attacker captures this session key, they can inject traffic into an ongoing authenticated session. To successfully achieve this, the attacker also needs to spoof both the IP address and MAC address of the originating host which is typical of a session-based attack.
0
Attacker Value
Unknown
CVE-2024-6678
Disclosure Date: September 12, 2024 (last updated February 26, 2025)
An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances.
0
Attacker Value
Unknown
CVE-2024-8096
Disclosure Date: September 11, 2024 (last updated February 26, 2025)
When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
0
Attacker Value
Unknown
CVE-2024-44104
Disclosure Date: September 10, 2024 (last updated February 26, 2025)
An incorrectly implemented authentication scheme that is subjected to a spoofing attack in the management console of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to escalate their privileges.
0
Attacker Value
Unknown
CVE-2024-31489
Disclosure Date: September 10, 2024 (last updated February 26, 2025)
AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation
0
Attacker Value
Unknown
CVE-2022-45856
Disclosure Date: September 10, 2024 (last updated February 26, 2025)
An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and both the service provider and the identity provider.
0
Attacker Value
Unknown
CVE-2024-40714
Disclosure Date: September 07, 2024 (last updated February 26, 2025)
An improper certificate validation vulnerability in TLS certificate validation allows an attacker on the same network to intercept sensitive credentials during restore operations.
0