Show filters
1,046 Total Results
Displaying 81-90 of 1,046
Sort by:
Attacker Value
Unknown
CVE-2024-8386
Disclosure Date: September 03, 2024 (last updated February 26, 2025)
If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2.
0
Attacker Value
Unknown
CVE-2024-8285
Disclosure Date: August 30, 2024 (last updated February 26, 2025)
A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server's hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.
0
Attacker Value
Unknown
CVE-2024-8260
Disclosure Date: August 30, 2024 (last updated February 26, 2025)
A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.
0
Attacker Value
Unknown
CVE-2024-7745
Disclosure Date: August 28, 2024 (last updated February 26, 2025)
In WS_FTP Server versions before 8.8.8 (2022.0.8), a Missing Critical Step in Multi-Factor Authentication of the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only.
0
Attacker Value
Unknown
CVE-2024-39771
Disclosure Date: August 28, 2024 (last updated February 26, 2025)
QBiC CLOUD CC-2L v1.1.30 and earlier and Safie One v1.8.2 and earlier do not properly validate certificates, which may allow a network-adjacent unauthenticated attacker to obtain and/or alter communications of the affected product via a man-in-the-middle attack.
0
Attacker Value
Unknown
CVE-2024-3982
Disclosure Date: August 27, 2024 (last updated February 26, 2025)
An attacker with local access to machine where MicroSCADA X
SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level
is not enabled and only users with administrator rights can enable it.
0
Attacker Value
Unknown
CVE-2024-41996
Disclosure Date: August 26, 2024 (last updated February 26, 2025)
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
0
Attacker Value
Unknown
CVE-2024-45244
Disclosure Date: August 25, 2024 (last updated February 26, 2025)
Hyperledger Fabric through 2.5.9 does not verify that a request has a timestamp within the expected time window.
0
Attacker Value
Unknown
CVE-2024-42364
Disclosure Date: August 23, 2024 (last updated February 26, 2025)
Homepage is a highly customizable homepage with Docker and service API integrations. The default setup of homepage 0.9.1 is vulnerable to DNS rebinding. Homepage is setup without certificate and authentication by default, leaving it to vulnerable to DNS rebinding. In this attack, an attacker will ask a user to visit his/her website. The attacker website will then change the DNS records of their domain from their IP address to the internal IP address of the homepage instance. To tell which IP addresses are valid, we can rebind a subdomain to each IP address we want to check, and see if there is a response. Once potential candidates have been found, the attacker can launch the attack by reading the response of the webserver after the IP address has changed. When the attacker domain is fetched, the response will be from the homepage instance, not the attacker website, because the IP address has been changed. Due to a lack of authentication, a user’s private information such as API keys (…
0
Attacker Value
Unknown
CVE-2024-37311
Disclosure Date: August 23, 2024 (last updated February 26, 2025)
Collabora Online is a collaborative online office suite based on LibreOffice. In affected versions of Collabora Online, https connections from coolwsd to other hosts may incompletely verify the remote host's certificate's against the full chain of trust. This vulnerability is fixed in Collabora Online 24.04.4.3, 23.05.14.1, and 22.05.23.1.
0