Show filters
498 topics marked with the following tags:
Displaying 141-150 of 498
Sort by:
Attacker Value
Moderate

CVE-2024-22024

Disclosure Date: February 13, 2024 (last updated February 14, 2024)
An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.
Attacker Value
Very High

FortiGate SSL VPN "Breaching the Fort"

Last updated September 25, 2020
Security researchers at SAM Seamless Network [published a blog post](https://securingsam.com/breaching-the-fort/) on September 24, 2020 stating that 200,000 businesses were exposed to Man-in-the-Middle (MITM) attacks against FortiGate SSL VPNs due to the VPN client's failure to properly verify the server's certificate out of the box. Instead, FortiGate customers must take the extra step of configuring their SSL VPNs with a certificate signed by a trusted CA.
3
Attacker Value
Moderate

CVE-2023-38511

Disclosure Date: April 15, 2024 (last updated April 16, 2024)
iTop is an IT service management platform. Dashboard editor : can load multiple files and URL, and full path disclosure on dashboard config file. This vulnerability is fixed in 3.0.4 and 3.1.1.
1
Attacker Value
Very High

CVE-2020-7388

Disclosure Date: July 07, 2021 (last updated October 07, 2023)
Sage X3 Unauthenticated Remote Command Execution (RCE) as SYSTEM in AdxDSrv.exe component. By editing the client side authentication request, an attacker can bypass credential validation. While exploiting this does require knowledge of the installation path, that information can be learned by exploiting CVE-2020-7387. This issue was fixed in AdxAdmin 93.2.53, which ships with updates for on-premises versions of Sage X3 including Version 9 (components shipped with Syracuse 9.22.7.2 and later), Sage X3 HR & Payroll Version 9 (those components that ship with Syracuse 9.24.1.3), Version 11 (components shipped with Syracuse 11.25.2.6 and later), and Version 12 (components shipped with Syracuse 12.10.2.8 and later) of Sage X3. Other on-premises versions of Sage X3 are unsupported by the vendor.
Attacker Value
Moderate

CVE-2023-29489

Disclosure Date: April 27, 2023 (last updated October 08, 2023)
An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the cpsrvd error page via an invalid webcall ID, aka SEC-669. The fixed versions are 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31.
Attacker Value
Moderate
An elevation of privilege vulnerability exists in Microsoft SharePoint. An attacker who successfully exploited this vulnerability could attempt to impersonate another user of the SharePoint server. To exploit this vulnerability, an authenticated attacker would send a specially crafted request to an affected server, thereby allowing the impersonation of another SharePoint user. The security update addresses the vulnerability by correcting how Microsoft SharePoint sanitizes user input.
0
Attacker Value
High

CVE-2024-30088

Disclosure Date: June 11, 2024 (last updated June 22, 2024)
Windows Kernel Elevation of Privilege Vulnerability
Attacker Value
Moderate

CVE-2020-17091

Disclosure Date: November 11, 2020 (last updated January 01, 2024)
Microsoft Teams Remote Code Execution Vulnerability
Attacker Value
High

CVE-2021-31956

Last updated June 08, 2021
Windows NTFS Elevation of Privilege Vulnerability To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The team at Kaspersky have reported threat actors are exploiting this Microsoft Windows OS kernel vulnerability Source: https://securelist.com/puzzlemaker-chrome-zero-day-exploit-chain/102771/
4
Attacker Value
Very High

CVE-2024-21887

Disclosure Date: January 12, 2024 (last updated January 13, 2024)
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.