Show filters
222 Total Results
Displaying 31-40 of 222
Sort by:
Attacker Value
Unknown

CVE-2024-5525

Disclosure Date: May 31, 2024 (last updated May 31, 2024)
Improper privilege management vulnerability in Astrotalks affecting version 10/03/2023. This vulnerability allows a local user to access the application as an administrator without any provided credentials, allowing the attacker to perform administrative actions.
0
Attacker Value
Unknown

CVE-2024-5524

Disclosure Date: May 31, 2024 (last updated May 31, 2024)
Information exposure vulnerability in Astrotalks affecting version 10/03/2023. This vulnerability allows unregistered users to access all internal links of the application without providing any credentials.
0
Attacker Value
Unknown

CVE-2024-5523

Disclosure Date: May 31, 2024 (last updated May 31, 2024)
SQL injection vulnerability in Astrotalks affecting version 10/03/2023. This vulnerability could allow an authenticated local user to send a specially crafted SQL query to the 'searchString' parameter and retrieve all information stored in the database.
0
Attacker Value
Unknown

CVE-2024-4609

Disclosure Date: May 16, 2024 (last updated January 31, 2025)
A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime.
Attacker Value
Unknown

CVE-2024-3640

Disclosure Date: May 16, 2024 (last updated May 17, 2024)
An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.
0
Attacker Value
Unknown

CVE-2024-20872

Disclosure Date: May 07, 2024 (last updated May 07, 2024)
Improper handling of insufficient privileges vulnerability in TalkbackSE prior to version Android 14 allows local attackers to modify setting value of TalkbackSE.
0
Attacker Value
Unknown

CVE-2024-31206

Disclosure Date: April 04, 2024 (last updated April 10, 2024)
dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In `dectalk-tts@1.0.0`, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version `1.0.1`. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it.
0
Attacker Value
Unknown

CVE-2024-21914

Disclosure Date: March 25, 2024 (last updated April 02, 2024)
A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell Automation PanelView™ Plus 7 terminal remotely without security protections. If the vulnerability is exploited, it could lead to the loss of view or control of the PanelView™ product.
0
Attacker Value
Unknown

CVE-2023-51696

Disclosure Date: February 29, 2024 (last updated March 21, 2024)
Cross-Site Request Forgery (CSRF) vulnerability in СleanTalk - Anti-Spam Protection Spam protection, Anti-Spam, FireWall by CleanTalk.This issue affects Spam protection, Anti-Spam, FireWall by CleanTalk: from n/a through 6.20.
0
Attacker Value
Unknown

CVE-2024-21915

Disclosure Date: February 16, 2024 (last updated December 21, 2024)
A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable.