Show filters
759 Total Results
Displaying 61-70 of 759
Sort by:
Attacker Value
Unknown

CVE-2024-47565

Disclosure Date: October 08, 2024 (last updated October 12, 2024)
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate that user input complies with a list of allowed values. This could allow an authenticated remote attacker to compromise the integrity of the configuration of the affected application.
Attacker Value
Unknown

CVE-2024-47563

Disclosure Date: October 08, 2024 (last updated October 12, 2024)
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate a file path that is supplied to an endpoint intended to create CSR files. This could allow an unauthenticated remote attacker to create files in writable directories outside the intended location and thus compromise integrity of files in those writable directories.
Attacker Value
Unknown

CVE-2024-47562

Disclosure Date: October 08, 2024 (last updated October 12, 2024)
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly neutralize special elements in user input to the ```ssmctl-client``` command. This could allow an authenticated, lowly privileged local attacker to execute privileged commands in the underlying OS.
Attacker Value
Unknown

CVE-2024-47553

Disclosure Date: October 08, 2024 (last updated October 12, 2024)
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate user input to the ```ssmctl-client``` command. This could allow an authenticated, lowly privileged remote attacker to execute arbitrary code with root privileges on the underlying OS.
Attacker Value
Unknown

CVE-2024-9158

Disclosure Date: September 30, 2024 (last updated October 08, 2024)
A stored cross site scripting vulnerability exists in Nessus Network Monitor where an authenticated, privileged local attacker could inject arbitrary code into the NNM UI via the local CLI.
Attacker Value
Unknown

CVE-2024-6981

Disclosure Date: September 27, 2024 (last updated September 28, 2024)
OMNTEC Proteus Tank Monitoring OEL8000III Series could allow an attacker to perform administrative actions without proper authentication.
0
Attacker Value
Unknown

CVE-2024-8552

Disclosure Date: September 26, 2024 (last updated October 03, 2024)
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the enable_shop() function in all versions up to, and including, 5.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable shop functionality.
Attacker Value
Unknown

CVE-2024-31416

Disclosure Date: September 13, 2024 (last updated September 20, 2024)
The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow.
Attacker Value
Unknown

CVE-2024-31415

Disclosure Date: September 13, 2024 (last updated September 20, 2024)
The Eaton Foreseer software provides the feasibility for the user to configure external servers for multiple purposes such as network management, user management, etc. The software uses encryption to store these configurations securely on the host machine. However, the keys used for this encryption were insecurely stored, which could be abused to possibly change or remove the server configuration.
Attacker Value
Unknown

CVE-2024-31414

Disclosure Date: September 13, 2024 (last updated September 20, 2024)
The Eaton Foreseer software provides users the capability to customize the dashboard in WebView pages. However, the input fields for this feature in the Eaton Foreseer software lacked proper input sanitization on the server-side, which could lead to injection and execution of malicious scripts when abused by bad actors.