Show filters
759 Total Results
Displaying 61-70 of 759
Sort by:
Attacker Value
Unknown
CVE-2024-47565
Disclosure Date: October 08, 2024 (last updated October 12, 2024)
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate that user input complies with a list of allowed values.
This could allow an authenticated remote attacker to compromise the integrity of the configuration of the affected application.
0
Attacker Value
Unknown
CVE-2024-47563
Disclosure Date: October 08, 2024 (last updated October 12, 2024)
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate a file path that is supplied to an endpoint intended to create CSR files.
This could allow an unauthenticated remote attacker to create files in writable directories outside the intended location and thus compromise integrity of files in those writable directories.
0
Attacker Value
Unknown
CVE-2024-47562
Disclosure Date: October 08, 2024 (last updated October 12, 2024)
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly neutralize special elements in user input to the ```ssmctl-client``` command.
This could allow an authenticated, lowly privileged local attacker to execute privileged commands in the underlying OS.
0
Attacker Value
Unknown
CVE-2024-47553
Disclosure Date: October 08, 2024 (last updated October 12, 2024)
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate user input to the ```ssmctl-client``` command.
This could allow an authenticated, lowly privileged remote attacker to execute arbitrary code with root privileges on the underlying OS.
0
Attacker Value
Unknown
CVE-2024-9158
Disclosure Date: September 30, 2024 (last updated October 08, 2024)
A stored cross site scripting vulnerability exists in Nessus Network Monitor where an authenticated, privileged local attacker could inject arbitrary code into the NNM UI via the local CLI.
0
Attacker Value
Unknown
CVE-2024-6981
Disclosure Date: September 27, 2024 (last updated September 28, 2024)
OMNTEC Proteus Tank Monitoring OEL8000III Series
could allow an attacker to perform administrative actions without proper authentication.
0
Attacker Value
Unknown
CVE-2024-8552
Disclosure Date: September 26, 2024 (last updated October 03, 2024)
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the enable_shop() function in all versions up to, and including, 5.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable shop functionality.
0
Attacker Value
Unknown
CVE-2024-31416
Disclosure Date: September 13, 2024 (last updated September 20, 2024)
The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow.
0
Attacker Value
Unknown
CVE-2024-31415
Disclosure Date: September 13, 2024 (last updated September 20, 2024)
The Eaton Foreseer software provides the feasibility for the user to configure external servers for multiple purposes such as network management, user management, etc. The software uses encryption to store these configurations securely on the host machine. However, the keys used for this encryption were insecurely stored, which could be abused to possibly change or remove the server configuration.
0
Attacker Value
Unknown
CVE-2024-31414
Disclosure Date: September 13, 2024 (last updated September 20, 2024)
The Eaton Foreseer software provides users the capability to customize the dashboard in WebView pages. However, the input fields for this feature in the Eaton Foreseer software lacked proper input sanitization on the server-side, which could lead to injection and execution of malicious scripts when abused by bad actors.
0