Show filters
1,748 Total Results
Displaying 41-50 of 1,748
Sort by:
Attacker Value
Unknown
CVE-2024-9003
Disclosure Date: September 19, 2024 (last updated September 26, 2024)
A vulnerability was found in Jinan Chicheng Company JFlow 2.0.0. It has been rated as problematic. This issue affects the function AttachmentUploadController of the file /WF/Ath/EntityMutliFile_Load.do of the component Attachment Handler. The manipulation of the argument oid leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-43188
Disclosure Date: September 18, 2024 (last updated September 29, 2024)
IBM Business Automation Workflow
22.0.2, 23.0.1, 23.0.2, and 24.0.0
could allow a privileged user to perform unauthorized activities due to improper client side validation.
0
Attacker Value
Unknown
CVE-2024-8969
Disclosure Date: September 18, 2024 (last updated September 18, 2024)
OMFLOW from The SYSCOM Group has a vulnerability involving the exposure of sensitive data. This allows remote attackers who have logged into the system to obtain password hashes of all users and administrators.
0
Attacker Value
Unknown
CVE-2024-8780
Disclosure Date: September 16, 2024 (last updated September 21, 2024)
OMFLOW from The SYSCOM Group does not properly restrict the query range of its data query functionality, allowing remote attackers with regular privileges to obtain accounts and password hashes of other users.
0
Attacker Value
Unknown
CVE-2024-8779
Disclosure Date: September 16, 2024 (last updated September 17, 2024)
OMFLOW from The SYSCOM Group does not properly restrict access to the system settings modification functionality, allowing remote attackers with regular privileges to update system settings or create accounts with administrator privileges, thereby gaining control of the server.
0
Attacker Value
Unknown
CVE-2024-8778
Disclosure Date: September 16, 2024 (last updated September 21, 2024)
OMFLOW from The SYSCOM Group does not properly validate user input of the download functionality, allowing remote attackers with regular privileges to read arbitrary system files.
0
Attacker Value
Unknown
CVE-2024-8777
Disclosure Date: September 16, 2024 (last updated September 21, 2024)
OMFLOW from The SYSCOM Group has an information leakage vulnerability, allowing unauthorized remote attackers to read arbitrary system configurations. If LDAP authentication is enabled, attackers can obtain plaintext credentials.
0
Attacker Value
Unknown
CVE-2024-45498
Disclosure Date: September 07, 2024 (last updated September 07, 2024)
Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873 for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.
0
Attacker Value
Unknown
CVE-2024-45034
Disclosure Date: September 07, 2024 (last updated September 07, 2024)
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author.
Users are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.
0
Attacker Value
Unknown
CVE-2024-1621
Disclosure Date: September 02, 2024 (last updated September 18, 2024)
The registration process of uniFLOW Online (NT-ware product) apps, prior to and including version 2024.1.0, can be compromised when email login is enabled on the tenant. Those tenants utilising email login in combination with Microsoft Safe Links or similar are impacted. This vulnerability may allow the attacker to register themselves against a genuine user in the system and allow malicious users with similar access and capabilities via the app to the existing genuine user.
0