Show filters
310 Total Results
Displaying 41-50 of 310
Sort by:
Attacker Value
Unknown
CVE-2024-6203
Disclosure Date: August 06, 2024 (last updated February 26, 2025)
HaloITSM versions up to 2.146.1 are affected by a Password Reset Poisoning vulnerability. Poisoned password reset links can be sent to existing HaloITSM users (given their email address is known). When these poisoned links get accessed (e.g. manually by the victim or automatically by an email client software), the password reset token is leaked to the malicious actor, allowing them to set a new password for the victim's account.This potentially leads to account takeover attacks.HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
0
Attacker Value
Unknown
CVE-2024-6202
Disclosure Date: August 06, 2024 (last updated February 26, 2025)
HaloITSM versions up to 2.146.1 are affected by a SAML XML Signature Wrapping (XSW) vulnerability. When having a SAML integration configured, anonymous actors could impersonate arbitrary HaloITSM users by just knowing their email address. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
0
Attacker Value
Unknown
CVE-2024-6201
Disclosure Date: August 06, 2024 (last updated February 26, 2025)
HaloITSM versions up to 2.146.1 are affected by a Template Injection vulnerability within the engine used to generate emails. This can lead to the leakage of potentially sensitive information. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
0
Attacker Value
Unknown
CVE-2024-6200
Disclosure Date: August 06, 2024 (last updated February 26, 2025)
HaloITSM versions up to 2.146.1 are affected by a Stored Cross-Site Scripting (XSS) vulnerability. The injected JavaScript code can execute arbitrary action on behalf of the user accessing a ticket. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
0
Attacker Value
Unknown
CVE-2024-38432
Disclosure Date: July 30, 2024 (last updated February 26, 2025)
Matrix Tafnit v8
-
CWE-646: Reliance on File Name or Extension of Externally-Supplied File
0
Attacker Value
Unknown
CVE-2024-38431
Disclosure Date: July 30, 2024 (last updated February 26, 2025)
Matrix Tafnit v8
-
CWE-204: Observable Response Discrepancy
0
Attacker Value
Unknown
CVE-2024-38430
Disclosure Date: July 30, 2024 (last updated February 26, 2025)
Matrix - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
0
Attacker Value
Unknown
CVE-2024-38429
Disclosure Date: July 30, 2024 (last updated February 26, 2025)
Matrix Tafnit v8
- CWE-552: Files or Directories Accessible to External Parties
0
Attacker Value
Unknown
CVE-2024-6447
Disclosure Date: July 11, 2024 (last updated January 05, 2025)
The FULL – Cliente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the license plan parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping as well as missing authorization and capability checks on the related functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute whenever an administrative user accesses wp-admin dashboard
0
Attacker Value
Unknown
CVE-2024-5178
Disclosure Date: July 10, 2024 (last updated February 26, 2025)
ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server. The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
0