Show filters
250 Total Results
Displaying 11-20 of 250
Sort by:
Attacker Value
Unknown
CVE-2024-37025
Disclosure Date: November 13, 2024 (last updated November 14, 2024)
Incorrect execution-assigned permissions in some Intel(R) Advanced Link Analyzer Standard Edition software installer before version 23.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2024-41744
Disclosure Date: November 01, 2024 (last updated November 02, 2024)
IBM CICS TX Standard 11.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
0
Attacker Value
Unknown
CVE-2024-8533
Disclosure Date: September 12, 2024 (last updated September 19, 2024)
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.
0
Attacker Value
Unknown
CVE-2023-38655
Disclosure Date: August 14, 2024 (last updated August 15, 2024)
Improper buffer restrictions in firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable denial of service via network access.
0
Attacker Value
Unknown
CVE-2024-36497
Disclosure Date: June 24, 2024 (last updated June 24, 2024)
The decrypted configuration file contains the password in cleartext
which is used to configure WINSelect. It can be used to remove the
existing restrictions and disable WINSelect entirely.
0
Attacker Value
Unknown
CVE-2024-36496
Disclosure Date: June 24, 2024 (last updated June 24, 2024)
The configuration file is encrypted with a static key derived from a
static five-character password which allows an attacker to decrypt this
file. The application hashes this five-character password with
the outdated and broken MD5 algorithm (no salt) and uses the first five
bytes as the key for RC4. The configuration file is then encrypted with
these parameters.
0
Attacker Value
Unknown
CVE-2024-36495
Disclosure Date: June 24, 2024 (last updated June 24, 2024)
The application Faronics WINSelect (Standard + Enterprise) saves its configuration in an encrypted file on the file system which "Everyone" has read and write access to, path to file:
C:\ProgramData\WINSelect\WINSelect.wsd
The path for the affected WINSelect Enterprise configuration file is:
C:\ProgramData\Faronics\StorageSpace\WS\WINSelect.wsd
0
Attacker Value
Unknown
CVE-2023-27321
Disclosure Date: May 07, 2024 (last updated May 08, 2024)
OPC Foundation UA .NET Standard ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20505.
0
Attacker Value
Unknown
CVE-2024-25002
Disclosure Date: March 25, 2024 (last updated April 02, 2024)
Command Injection in the diagnostics interface of the Bosch Network Synchronizer allows unauthorized users full access to the device.
0
Attacker Value
Unknown
CVE-2023-40747
Disclosure Date: March 18, 2024 (last updated April 01, 2024)
Directory traversal vulnerability exists in A.K.I Software's PMailServer/PMailServer2 products' CGIs included in Internal Simple Webserver. If this vulnerability is exploited, a remote attacker may access arbitrary files outside DocumentRoot.
0