Show filters
1,998 Total Results
Displaying 191-200 of 1,998
Sort by:
Attacker Value
Unknown
CVE-2024-29841
Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_KEYS_FIELDS, allowing for an unauthenticated attacker to return the keys value of any user
0
Attacker Value
Unknown
CVE-2024-29840
Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_PIN_FIELDS, allowing for an unauthenticated attacker to return the pin value of any user
0
Attacker Value
Unknown
CVE-2024-29839
Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_CARD, allowing for an unauthenticated attacker to return the card value data of any user
0
Attacker Value
Unknown
CVE-2024-29838
Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below does not proper sanitize user input, allowing for an unauthenticated attacker to crash the controller software
0
Attacker Value
Unknown
CVE-2024-29837
Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below uses poor session management, allowing for an unauthenticated attacker to access administrator functionality if any other user is already signed in.
0
Attacker Value
Unknown
CVE-2024-29836
Disclosure Date: April 15, 2024 (last updated February 26, 2025)
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control, allowing for an unauthenticated attacker to update and add user profiles within the application, and gain full access of the site.
0
Attacker Value
Unknown
CVE-2024-30451
Disclosure Date: March 29, 2024 (last updated February 26, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in INFINITUM FORM Geo Controller allows Stored XSS.This issue affects Geo Controller: from n/a through 8.6.4.
0
Attacker Value
Unknown
CVE-2024-30227
Disclosure Date: March 28, 2024 (last updated February 26, 2025)
Deserialization of Untrusted Data vulnerability in INFINITUM FORM Geo Controller.This issue affects Geo Controller: from n/a through 8.6.4.
0
Attacker Value
Unknown
CVE-2024-20354
Disclosure Date: March 27, 2024 (last updated February 26, 2025)
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.
This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.
0
Attacker Value
Unknown
CVE-2024-20271
Disclosure Date: March 27, 2024 (last updated February 26, 2025)
A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets.
0