Show filters
461 Total Results
Displaying 111-120 of 461
Sort by:
Attacker Value
Unknown

CVE-2023-38419

Disclosure Date: August 02, 2023 (last updated February 25, 2025)
An authenticated attacker with guest privileges or higher can cause the iControl SOAP process to terminate by sending undisclosed requests.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2022-43713

Disclosure Date: July 26, 2023 (last updated February 25, 2025)
Interactive Forms (IAF) in GX Software XperienCentral versions 10.33.1 until 10.35.0 was vulnerable to invalid data input because form validation could be bypassed.
Attacker Value
Unknown

CVE-2022-43712

Disclosure Date: July 26, 2023 (last updated February 25, 2025)
POST requests to /web/mvc in GX Software XperienCentral version 10.36.0 and earlier were not blocked for uses that are not logged in. If an unauthorized user is able to bypass other security filters they are able to post unauthorized data to the server because of CVE-2022-22965.
Attacker Value
Unknown

CVE-2022-43711

Disclosure Date: July 26, 2023 (last updated February 25, 2025)
Interactive Forms (IAF) in GX Software XperienCentral versions 10.29.1 until 10.33.0 was vulnerable to cross site scripting attacks (XSS) because the CSP header uses eval() in the script-src.
Attacker Value
Unknown

CVE-2022-43710

Disclosure Date: July 26, 2023 (last updated February 25, 2025)
Interactive Forms (IAF) in GX Software XperienCentral versions 10.31.0 until 10.33.0 was vulnerable to cross site request forgery (CSRF) because the unique token could be deduced using the names of all input fields.
Attacker Value
Unknown

CVE-2023-3514

Disclosure Date: July 14, 2023 (last updated February 25, 2025)
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and calling "AddModule" or "UninstallModules" command to execute arbitrary executable file.
Attacker Value
Unknown

CVE-2023-3513

Disclosure Date: July 14, 2023 (last updated February 25, 2025)
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and triggering an insecure .NET deserialization.
Attacker Value
Unknown

CVE-2023-34734

Disclosure Date: June 29, 2023 (last updated February 25, 2025)
Annet AC Centralized Management Platform 1.02.040 is vulnerable to Stored Cross-Site Scripting (XSS) .
Attacker Value
Unknown

CVE-2023-28857

Disclosure Date: June 27, 2023 (last updated February 25, 2025)
Apereo CAS is an open source multilingual single sign-on solution for the web. Apereo CAS can be configured to use authentication based on client X509 certificates. These certificates can be provided via TLS handshake or a special HTTP header, such as “ssl_client_cert”. When checking the validity of the provided client certificate, X509CredentialsAuthenticationHandler performs check that this certificate is not revoked. To do so, it fetches URLs provided in the “CRL Distribution Points” extension of the certificate, which are taken from the certificate itself and therefore can be controlled by a malicious user. If the CAS server is configured to use an LDAP server for x509 authentication with a password, for example by setting a “cas.authn.x509.ldap.ldap-url” and “cas.authn.x509.ldap.bind-credential” properties, X509CredentialsAuthenticationHandler fetches revocation URLs from the certificate, which can be LDAP urls. When making requests to this LDAP urls, Apereo CAS uses the same pas…
Attacker Value
Unknown

CVE-2023-32605

Disclosure Date: June 26, 2023 (last updated February 25, 2025)
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32604.