Show filters
227 Total Results
Displaying 1-10 of 227
Sort by:
Attacker Value
Unknown

CVE-2023-28971

Disclosure Date: April 12, 2023 (last updated February 24, 2025)
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the timescaledb feature of Juniper Networks Paragon Active Assurance (PAA) (Formerly Netrounds) allows an attacker to bypass existing firewall rules and limitations used to restrict internal communcations. The Test Agents (TA) Appliance connects to the Control Center (CC) using OpenVPN. TA's are assigned an internal IP address in the 100.70.0.0/16 range. Firewall rules exists to limit communication from TA's to the CC to specific services only. OpenVPN is configured to not allow direct communication between Test Agents in the OpenVPN application itself, and routing is normally not enabled on the server running the CC application. The timescaledb feature is installed as an optional package on the Control Center. When the timescaledb container is started, this causes side-effects by bypassing the existing firewall rules and limitations for Test Agent communications. Note: This issue only affects cust…
Attacker Value
Unknown

CVE-2024-12315

Disclosure Date: February 12, 2025 (last updated February 26, 2025)
The Export All Posts, Products, Orders, Refunds & Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.3 via the exports directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/smack_uci_uploads/exports/ directory which can contain information like exported user data.
0
Attacker Value
Unknown

CVE-2024-55931

Disclosure Date: January 27, 2025 (last updated February 25, 2025)
Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user's session is compromised.  The patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin.
0
Attacker Value
Unknown

CVE-2024-25655

Disclosure Date: March 18, 2024 (last updated February 26, 2025)
Insecure storage of LDAP passwords in the authentication functionality of AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS allows members (with read access to the application database) to decrypt the LDAP passwords of users who successfully authenticate to web management via LDAP.
0
Attacker Value
Unknown

CVE-2024-28069

Disclosure Date: March 16, 2024 (last updated February 26, 2025)
A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.0.0.4 could allow an unauthenticated attacker to conduct an information disclosure attack due to improper configuration. A successful exploit could allow an attacker to access sensitive information and potentially conduct unauthorized actions within the vulnerable component.
0
Attacker Value
Unknown

CVE-2024-23290

Disclosure Date: March 08, 2024 (last updated February 26, 2025)
A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 17.4, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, watchOS 10.4. An app may be able to access user-sensitive data.
Attacker Value
Unknown

CVE-2024-23241

Disclosure Date: March 08, 2024 (last updated February 26, 2025)
This issue was addressed through improved state management. This issue is fixed in tvOS 17.4, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4. An app may be able to leak sensitive user information.
Attacker Value
Unknown

CVE-2024-23205

Disclosure Date: March 08, 2024 (last updated February 26, 2025)
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.4, iOS 17.4 and iPadOS 17.4. An app may be able to access sensitive user data.
Attacker Value
Unknown

CVE-2024-1936

Disclosure Date: March 04, 2024 (last updated February 26, 2025)
The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third-party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird < 115.8.1.
0
Attacker Value
Unknown

CVE-2023-41829

Disclosure Date: March 04, 2024 (last updated February 26, 2025)
An improper export vulnerability was reported in the Motorola Carrier Services application that could allow a malicious, local application to read files without authorization.
0