Show filters
461 Total Results
Displaying 11-20 of 461
Sort by:
Attacker Value
Unknown

CVE-2023-24502

Disclosure Date: April 17, 2023 (last updated October 08, 2023)
Electra Central AC unit – The unit opens an AP with an easily calculated password.
Attacker Value
Unknown

CVE-2023-24501

Disclosure Date: April 17, 2023 (last updated October 08, 2023)
Electra Central AC unit – Hardcoded Credentials in unspecified code used by the unit.
Attacker Value
Unknown

CVE-2020-15909

Disclosure Date: October 19, 2020 (last updated February 22, 2025)
SolarWinds N-central through 2020.1 allows session hijacking and requires user interaction or physical access. The N-Central JSESSIONID cookie attribute is not checked against multiple sources such as sourceip, MFA claim, etc. as long as the victim stays logged in within N-Central. To take advantage of this, cookie could be stolen and the JSESSIONID can be captured. On its own this is not a surprising result; low security tools allow the cookie to roam from machine to machine. The JSESSION cookie can then be used on the attackers’ workstation by browsing to the victim’s NCentral server URL and replacing the JSESSIONID attribute value by the captured value. Expected behavior would be to check this against a second source and enforce at least a reauthentication or multi factor request as N-Central is a highly privileged service.
Attacker Value
High

CVE-2020-15588

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
An issue was discovered in the client side of Zoho ManageEngine Desktop Central 10.0.552.W. An attacker-controlled server can trigger an integer overflow in InternetSendRequestEx and InternetSendRequestByBitrate that leads to a heap-based buffer overflow and Remote Code Execution with SYSTEM privileges. This issue will occur only when untrusted communication is initiated with server. In cloud, Agent will always connect with trusted communication.
Attacker Value
Unknown

CVE-2017-12617

Disclosure Date: October 04, 2017 (last updated July 17, 2024)
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
Attacker Value
Unknown

CVE-2025-0064

Disclosure Date: February 11, 2025 (last updated February 12, 2025)
Under specific conditions, the Central Management Console of the SAP BusinessObjects Business Intelligence platform allows an attacker with admin rights to generate or retrieve a secret passphrase, enabling them to impersonate any user in the system. This results in a high impact on confidentiality and integrity, with no impact on availability.
0
Attacker Value
Unknown

CVE-2025-24319

Disclosure Date: February 05, 2025 (last updated February 06, 2025)
When BIG-IP Next Central Manager is running, undisclosed requests to the BIG-IP Next Central Manager API can cause the BIG-IP Next Central Manager Node's Kubernetes service to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown

CVE-2025-23413

Disclosure Date: February 05, 2025 (last updated February 06, 2025)
When users log in through the webUI or API using local authentication, BIG-IP Next Central Manager may log sensitive information in the pgaudit log files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown

CVE-2024-9097

Disclosure Date: February 05, 2025 (last updated February 06, 2025)
ManageEngine Endpoint Central versions before 11.3.2440.09 are vulnerable to IDOR vulnerability which allows the attacker to change the username in the chat.
0
Attacker Value
Unknown

CVE-2024-53832

Disclosure Date: December 10, 2024 (last updated December 21, 2024)
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V05.30). The affected devices contain a secure element which is connected via an unencrypted SPI bus. This could allow an attacker with physical access to the SPI bus to observe the password used for the secure element authentication, and then use the secure element as an oracle to decrypt all encrypted update files.