Show filters
480 Total Results
Displaying 61-70 of 480
Sort by:
Attacker Value
Unknown

CVE-2023-23464

Disclosure Date: February 15, 2023 (last updated October 08, 2023)
Media CP Media Control Panel latest version. A Permissive Flash Cross-domain Policy may allow information disclosure.
Attacker Value
Unknown

CVE-2023-23465

Disclosure Date: February 15, 2023 (last updated February 24, 2025)
Media CP Media Control Panel latest version. CSRF possible through unspecified endpoint.
Attacker Value
Unknown

CVE-2023-23467

Disclosure Date: February 15, 2023 (last updated February 24, 2025)
Media CP Media Control Panel latest version. Reflected XSS possible through unspecified endpoint.
Attacker Value
Unknown

CVE-2023-23466

Disclosure Date: February 15, 2023 (last updated February 24, 2025)
Media CP Media Control Panel latest version. Insufficiently protected credential change.
Attacker Value
Unknown

CVE-2022-45789

Disclosure Date: January 31, 2023 (last updated February 24, 2025)
A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause execution of unauthorized Modbus functions on the controller when hijacking an authenticated Modbus session. Affected Products: EcoStruxure Control Expert (All Versions), EcoStruxure Process Expert (All Versions), Modicon M340 CPU - part numbers BMXP34* (All Versions), Modicon M580 CPU - part numbers BMEP* and BMEH* (All Versions), Modicon M580 CPU Safety - part numbers BMEP58*S and BMEH58*S (All Versions)
Attacker Value
Unknown

CVE-2022-45788

Disclosure Date: January 30, 2023 (last updated February 24, 2025)
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause arbitrary code execution, denial of service and loss of confidentiality & integrity when a malicious project file is loaded onto the controller. Affected Products: EcoStruxure Control Expert (All Versions), EcoStruxure Process Expert (All Versions), Modicon M340 CPU - part numbers BMXP34* (All Versions), Modicon M580 CPU - part numbers BMEP* and BMEH* (All Versions), Modicon M580 CPU Safety - part numbers BMEP58*S and BMEH58*S (All Versions), Modicon Momentum Unity M1E Processor - 171CBU* (All Versions), Modicon MC80 - BMKC80 (All Versions), Legacy Modicon Quantum - 140CPU65* and Premium CPUs - TSXP57* (All Versions)
Attacker Value
Unknown

CVE-2021-24942

Disclosure Date: December 26, 2022 (last updated February 24, 2025)
The Menu Item Visibility Control WordPress plugin through 0.5 doesn't sanitize and validate the "Visibility logic" option for WordPress menu items, which could allow highly privileged users to execute arbitrary PHP code even in a hardened environment.
Attacker Value
Unknown

CVE-2022-30260

Disclosure Date: December 26, 2022 (last updated February 24, 2025)
Emerson DeltaV Distributed Control System (DCS) has insufficient verification of firmware integrity (an inadequate checksum approach, and no signature). This affects versions before 14.3 of DeltaV M-series, DeltaV S-series, DeltaV P-series, DeltaV SIS, and DeltaV CIOC/EIOC/WIOC IO cards.
Attacker Value
Unknown

CVE-2022-47578

Disclosure Date: December 20, 2022 (last updated February 24, 2025)
An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by booting into Safe Mode. This allows a file to be exchanged outside the laptop/system. Safe Mode can be launched by any user (even without admin rights). Data exfiltration can occur, and also malware might be introduced onto the system. NOTE: the vendor's position is "it's not a vulnerability in our product."
Attacker Value
Unknown

CVE-2022-47577

Disclosure Date: December 20, 2022 (last updated November 08, 2023)
An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by making use of a virtual machine (VM). This allows a file to be exchanged outside the laptop/system. VMs can be created by any user (even without admin rights). The data exfiltration can occur without any record in the audit trail of Windows events on the host machine. NOTE: the vendor's position is "it's not a vulnerability in our product."