Show filters
1,998 Total Results
Displaying 191-200 of 1,998
Sort by:
Attacker Value
Unknown

CVE-2024-29841

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_KEYS_FIELDS, allowing for an unauthenticated attacker to return the keys value of any user
0
Attacker Value
Unknown

CVE-2024-29840

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_PIN_FIELDS, allowing for an unauthenticated attacker to return the pin value of any user
0
Attacker Value
Unknown

CVE-2024-29839

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_CARD, allowing for an unauthenticated attacker to return the card value data of any user
0
Attacker Value
Unknown

CVE-2024-29838

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below does not proper sanitize user input, allowing for an unauthenticated attacker to crash the controller software
0
Attacker Value
Unknown

CVE-2024-29837

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below uses poor session management, allowing for an unauthenticated attacker to access administrator functionality if any other user is already signed in.
0
Attacker Value
Unknown

CVE-2024-29836

Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control, allowing for an unauthenticated attacker to update and add user profiles within the application, and gain full access of the site.
0
Attacker Value
Unknown

CVE-2024-30451

Disclosure Date: March 29, 2024 (last updated February 26, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in INFINITUM FORM Geo Controller allows Stored XSS.This issue affects Geo Controller: from n/a through 8.6.4.
0
Attacker Value
Unknown

CVE-2024-30227

Disclosure Date: March 28, 2024 (last updated February 26, 2025)
Deserialization of Untrusted Data vulnerability in INFINITUM FORM Geo Controller.This issue affects Geo Controller: from n/a through 8.6.4.
0
Attacker Value
Unknown

CVE-2024-20354

Disclosure Date: March 27, 2024 (last updated February 26, 2025)
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.
0
Attacker Value
Unknown

CVE-2024-20271

Disclosure Date: March 27, 2024 (last updated February 26, 2025)
A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets.
0