Show filters
1,998 Total Results
Displaying 181-190 of 1,998
Sort by:
Attacker Value
Unknown

CVE-2024-33514

Disclosure Date: May 01, 2024 (last updated February 26, 2025)
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
0
Attacker Value
Unknown

CVE-2024-33513

Disclosure Date: May 01, 2024 (last updated February 26, 2025)
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
0
Attacker Value
Unknown

CVE-2024-33512

Disclosure Date: May 01, 2024 (last updated February 26, 2025)
There is a buffer overflow vulnerability in the underlying Local User Authentication Database service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
0
Attacker Value
Unknown

CVE-2024-33511

Disclosure Date: May 01, 2024 (last updated February 26, 2025)
There is a buffer overflow vulnerability in the underlying Automatic Reporting service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
0
Attacker Value
Unknown

CVE-2024-26304

Disclosure Date: May 01, 2024 (last updated February 26, 2025)
There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
0
Attacker Value
Unknown

CVE-2024-3591

Disclosure Date: May 01, 2024 (last updated May 01, 2024)
The Geo Controller WordPress plugin before 8.6.5 unserializes user input via some of its AJAX actions and REST API routes, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog.
0
Attacker Value
Unknown

CVE-2024-29844

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
Default credentials on the Web Interface of Evolution Controller 2.x allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password.
0
Attacker Value
Unknown

CVE-2024-29843

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on MOBILE_GET_USERS_LIST, allowing for an unauthenticated attacker to enumerate all users and their access levels
0
Attacker Value
Unknown

CVE-2024-29842

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_ABACARD_FIELDS, allowing for an unauthenticated attacker to return the abacard field of any user
0
Attacker Value
Unknown

CVE-2024-29841

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_KEYS_FIELDS, allowing for an unauthenticated attacker to return the keys value of any user
0