Show filters
12,756 Total Results
Displaying 191-200 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown
CVE-2024-50567
Disclosure Date: February 11, 2025 (last updated February 12, 2025)
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb 7.4.0 through 7.6.0 allows attacker to execute unauthorized code or commands via crafted input.
0
Attacker Value
Unknown
CVE-2024-28989
Disclosure Date: February 11, 2025 (last updated February 26, 2025)
SolarWinds Web Help Desk was found to have a hardcoded cryptographic key that could allow the disclosure of sensitive information from the software.
0
Attacker Value
Unknown
CVE-2025-24869
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
SAP NetWeaver Application Server Java allows an attacker to access an endpoint that can disclose information about deployed server components, including their XML definitions. This information should ideally be restricted to customer administrators, even though they may not need it. These XML files are not entirely SAP-internal as they are deployed with the server. In such a scenario, sensitive information could be exposed without compromising its integrity or availability.
0
Attacker Value
Unknown
CVE-2025-23193
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
SAP NetWeaver Server ABAP allows an unauthenticated attacker to exploit a vulnerability that causes the server to respond differently based on the existence of a specified user, potentially revealing sensitive information. This issue does not enable data modification and has no impact on server availability.
0
Attacker Value
Unknown
CVE-2025-23190
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
Due to missing authorization check, an authenticated attacker could call a remote-enabled function module which allows them to access data that they would otherwise not have access to. The attacker cannot modify data or impact the availability of the system.
0
Attacker Value
Unknown
CVE-2025-23189
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an authenticated attacker could generate technical meta-data. This leads to a low impact on integrity. There is no impact on confidentiality or availability
0
Attacker Value
Unknown
CVE-2025-23187
Disclosure Date: February 11, 2025 (last updated February 12, 2025)
Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an unauthenticated attacker could generate technical meta-data. This leads to a low impact on integrity. There is no impact on confidentiality or availability.
0
Attacker Value
Unknown
CVE-2025-0054
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
SAP NetWeaver Application Server Java does not sufficiently handle user input, resulting in a stored cross-site scripting vulnerability. The application allows attackers with basic user privileges to store a Javascript payload on the server, which could be later executed in the victim's web browser. With this the attacker might be able to read or modify information associated with the vulnerable web page.
0
Attacker Value
Unknown
CVE-2025-1002
Disclosure Date: February 10, 2025 (last updated February 11, 2025)
MicroDicom DICOM Viewer version 2024.03
fails to adequately verify the update server's certificate, which could make it possible for attackers in a privileged network position to alter network traffic and carry out a machine-in-the-middle (MITM) attack. This allows the attackers to modify the server's response and deliver a malicious update to the user.
0
Attacker Value
Unknown
CVE-2025-25247
Disclosure Date: February 10, 2025 (last updated February 11, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Felix Webconsole.
This issue affects Apache Felix Webconsole 4.x up to 4.9.8 and 5.x up to 5.0.8.
Users are recommended to upgrade to version 4.9.10 or 5.0.10 or higher, which fixes the issue.
0