Show filters
250 Total Results
Displaying 11-20 of 250
Sort by:
Attacker Value
Unknown

CVE-2024-37025

Disclosure Date: November 13, 2024 (last updated November 14, 2024)
Incorrect execution-assigned permissions in some Intel(R) Advanced Link Analyzer Standard Edition software installer before version 23.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown

CVE-2024-41744

Disclosure Date: November 01, 2024 (last updated November 02, 2024)
IBM CICS TX Standard 11.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
Attacker Value
Unknown

CVE-2024-8533

Disclosure Date: September 12, 2024 (last updated September 19, 2024)
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.
Attacker Value
Unknown

CVE-2023-38655

Disclosure Date: August 14, 2024 (last updated August 15, 2024)
Improper buffer restrictions in firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable denial of service via network access.
0
Attacker Value
Unknown

CVE-2024-36497

Disclosure Date: June 24, 2024 (last updated June 24, 2024)
The decrypted configuration file contains the password in cleartext which is used to configure WINSelect. It can be used to remove the existing restrictions and disable WINSelect entirely.
0
Attacker Value
Unknown

CVE-2024-36496

Disclosure Date: June 24, 2024 (last updated June 24, 2024)
The configuration file is encrypted with a static key derived from a static five-character password which allows an attacker to decrypt this file. The application hashes this five-character password with the outdated and broken MD5 algorithm (no salt) and uses the first five bytes as the key for RC4. The configuration file is then encrypted with these parameters.
0
Attacker Value
Unknown

CVE-2024-36495

Disclosure Date: June 24, 2024 (last updated June 24, 2024)
The application Faronics WINSelect (Standard + Enterprise) saves its configuration in an encrypted file on the file system which "Everyone" has read and write access to, path to file: C:\ProgramData\WINSelect\WINSelect.wsd The path for the affected WINSelect Enterprise configuration file is: C:\ProgramData\Faronics\StorageSpace\WS\WINSelect.wsd
0
Attacker Value
Unknown

CVE-2023-27321

Disclosure Date: May 07, 2024 (last updated May 08, 2024)
OPC Foundation UA .NET Standard ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20505.
0
Attacker Value
Unknown

CVE-2024-25002

Disclosure Date: March 25, 2024 (last updated April 02, 2024)
Command Injection in the diagnostics interface of the Bosch Network Synchronizer allows unauthorized users full access to the device.
0
Attacker Value
Unknown

CVE-2023-40747

Disclosure Date: March 18, 2024 (last updated April 01, 2024)
Directory traversal vulnerability exists in A.K.I Software's PMailServer/PMailServer2 products' CGIs included in Internal Simple Webserver. If this vulnerability is exploited, a remote attacker may access arbitrary files outside DocumentRoot.
0