Show filters
3,317 Total Results
Displaying 351-360 of 3,317
Sort by:
Attacker Value
Unknown
CVE-2023-5389
Disclosure Date: January 30, 2024 (last updated February 26, 2025)
An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
0
Attacker Value
Unknown
CVE-2023-52187
Disclosure Date: January 27, 2024 (last updated February 26, 2025)
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Thomas Maier Image Source Control Lite – Show Image Credits and Captions.This issue affects Image Source Control Lite – Show Image Credits and Captions: from n/a through 2.17.0.
0
Attacker Value
Unknown
CVE-2023-35020
Disclosure Date: January 19, 2024 (last updated February 26, 2025)
IBM Sterling Control Center 6.3.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 257874.
0
Attacker Value
Unknown
CVE-2022-1760
Disclosure Date: January 16, 2024 (last updated February 26, 2025)
The Core Control WordPress plugin through 1.2.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
0
Attacker Value
Unknown
CVE-2024-21589
Disclosure Date: January 12, 2024 (last updated February 26, 2025)
An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.
A feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.
Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.
This issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.
This issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.
0
Attacker Value
Unknown
CVE-2024-0310
Disclosure Date: January 10, 2024 (last updated February 25, 2025)
A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration.
0
Attacker Value
Unknown
CVE-2022-3010
Disclosure Date: January 02, 2024 (last updated February 25, 2025)
The Priva TopControl Suite contains predictable credentials for the SSH service, based on the Serial number. Which makes it possible for an attacker to calculate the login credentials for the Priva TopControll suite.
0
Attacker Value
Unknown
CVE-2023-6355
Disclosure Date: December 18, 2023 (last updated February 25, 2025)
Incorrect selection of fuse values in the Controller 7000 platform allows an attacker to bypass some protection mechanisms to enable local debug.
This issue affects: Gallagher Controller 7000 9.00 prior to vCR9.00.231204b (distributed in 9.00.1507 (MR1)), 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)).
0
Attacker Value
Unknown
CVE-2023-41967
Disclosure Date: December 18, 2023 (last updated February 25, 2025)
Sensitive information uncleared after debug/power state transition in the Controller 6000 could be abused by an attacker with knowledge of the Controller's default diagnostic password and physical access to the Controller to view its configuration through the diagnostic web pages.
This issue affects: Gallagher Controller 6000 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), v8.60 or earlier.
0
Attacker Value
Unknown
CVE-2023-24590
Disclosure Date: December 18, 2023 (last updated February 25, 2025)
A format string issue in the Controller 6000's optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.
This issue affects: Gallagher Controller 6000 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
0