Show filters
1,114 Total Results
Displaying 151-160 of 1,114
Sort by:
Attacker Value
Unknown

CVE-2024-8260

Disclosure Date: August 30, 2024 (last updated February 26, 2025)
A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.
Attacker Value
Unknown

CVE-2024-7745

Disclosure Date: August 28, 2024 (last updated February 26, 2025)
In WS_FTP Server versions before 8.8.8 (2022.0.8), a Missing Critical Step in Multi-Factor Authentication of the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only.
Attacker Value
Unknown

CVE-2024-39771

Disclosure Date: August 28, 2024 (last updated February 26, 2025)
QBiC CLOUD CC-2L v1.1.30 and earlier and Safie One v1.8.2 and earlier do not properly validate certificates, which may allow a network-adjacent unauthenticated attacker to obtain and/or alter communications of the affected product via a man-in-the-middle attack.
Attacker Value
Unknown

CVE-2024-3982

Disclosure Date: August 27, 2024 (last updated February 26, 2025)
An attacker with local access to machine where MicroSCADA X SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level is not enabled and only users with administrator rights can enable it.
Attacker Value
Unknown

CVE-2024-41996

Disclosure Date: August 26, 2024 (last updated February 26, 2025)
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
0
Attacker Value
Unknown

CVE-2024-45244

Disclosure Date: August 25, 2024 (last updated February 26, 2025)
Hyperledger Fabric through 2.5.9 does not verify that a request has a timestamp within the expected time window.
Attacker Value
Unknown

CVE-2024-42364

Disclosure Date: August 23, 2024 (last updated February 26, 2025)
Homepage is a highly customizable homepage with Docker and service API integrations. The default setup of homepage 0.9.1 is vulnerable to DNS rebinding. Homepage is setup without certificate and authentication by default, leaving it to vulnerable to DNS rebinding. In this attack, an attacker will ask a user to visit his/her website. The attacker website will then change the DNS records of their domain from their IP address to the internal IP address of the homepage instance. To tell which IP addresses are valid, we can rebind a subdomain to each IP address we want to check, and see if there is a response. Once potential candidates have been found, the attacker can launch the attack by reading the response of the webserver after the IP address has changed. When the attacker domain is fetched, the response will be from the homepage instance, not the attacker website, because the IP address has been changed. Due to a lack of authentication, a user’s private information such as API keys (…
Attacker Value
Unknown

CVE-2024-37311

Disclosure Date: August 23, 2024 (last updated February 26, 2025)
Collabora Online is a collaborative online office suite based on LibreOffice. In affected versions of Collabora Online, https connections from coolwsd to other hosts may incompletely verify the remote host's certificate's against the full chain of trust. This vulnerability is fixed in Collabora Online 24.04.4.3, 23.05.14.1, and 22.05.23.1.
0
Attacker Value
Unknown

CVE-2024-8007

Disclosure Date: August 21, 2024 (last updated February 26, 2025)
A flaw was found in the openstack-tripleo-common component of the Red Hat OpenStack Platform (RHOSP) director. This vulnerability allows an attacker to deploy potentially compromised container images via disabling TLS certificate verification for registry mirrors, which could enable a man-in-the-middle (MITM) attack.
Attacker Value
Unknown

CVE-2024-35539

Disclosure Date: August 19, 2024 (last updated February 26, 2025)
Typecho v1.3.0 was discovered to contain a race condition vulnerability in the post commenting function. This vulnerability allows attackers to post several comments before the spam protection checks if the comments are posted too frequently.
0