Show filters
310 Total Results
Displaying 41-50 of 310
Sort by:
Attacker Value
Unknown

CVE-2024-6203

Disclosure Date: August 06, 2024 (last updated February 26, 2025)
HaloITSM versions up to 2.146.1 are affected by a Password Reset Poisoning vulnerability. Poisoned password reset links can be sent to existing HaloITSM users (given their email address is known). When these poisoned links get accessed (e.g. manually by the victim or automatically by an email client software), the password reset token is leaked to the malicious actor, allowing them to set a new password for the victim's account.This potentially leads to account takeover attacks.HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
Attacker Value
Unknown

CVE-2024-6202

Disclosure Date: August 06, 2024 (last updated February 26, 2025)
HaloITSM versions up to 2.146.1 are affected by a SAML XML Signature Wrapping (XSW) vulnerability. When having a SAML integration configured, anonymous actors could impersonate arbitrary HaloITSM users by just knowing their email address. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
Attacker Value
Unknown

CVE-2024-6201

Disclosure Date: August 06, 2024 (last updated February 26, 2025)
HaloITSM versions up to 2.146.1 are affected by a Template Injection vulnerability within the engine used to generate emails. This can lead to the leakage of potentially sensitive information. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
Attacker Value
Unknown

CVE-2024-6200

Disclosure Date: August 06, 2024 (last updated February 26, 2025)
HaloITSM versions up to 2.146.1 are affected by a Stored Cross-Site Scripting (XSS) vulnerability. The injected JavaScript code can execute arbitrary action on behalf of the user accessing a ticket. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
Attacker Value
Unknown

CVE-2024-38432

Disclosure Date: July 30, 2024 (last updated February 26, 2025)
Matrix Tafnit v8 - CWE-646: Reliance on File Name or Extension of Externally-Supplied File
Attacker Value
Unknown

CVE-2024-38431

Disclosure Date: July 30, 2024 (last updated February 26, 2025)
Matrix Tafnit v8 - CWE-204: Observable Response Discrepancy
Attacker Value
Unknown

CVE-2024-38430

Disclosure Date: July 30, 2024 (last updated February 26, 2025)
Matrix - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Attacker Value
Unknown

CVE-2024-38429

Disclosure Date: July 30, 2024 (last updated February 26, 2025)
Matrix Tafnit v8 -  CWE-552: Files or Directories Accessible to External Parties
Attacker Value
Unknown

CVE-2024-6447

Disclosure Date: July 11, 2024 (last updated January 05, 2025)
The FULL – Cliente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the license plan parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping as well as missing authorization and capability checks on the related functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute whenever an administrative user accesses wp-admin dashboard
0
Attacker Value
Unknown

CVE-2024-5178

Disclosure Date: July 10, 2024 (last updated February 26, 2025)
ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server. The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
0