Show filters
8,645 Total Results
Displaying 671-680 of 8,645
Sort by:
Attacker Value
Unknown
CVE-2024-47944
Disclosure Date: October 15, 2024 (last updated February 26, 2025)
The device directly executes .patch firmware upgrade files on a USB stick without any prior authentication in the admin interface. This leads to an unauthenticated code execution via the firmware upgrade function.
0
Attacker Value
Unknown
CVE-2024-47943
Disclosure Date: October 15, 2024 (last updated February 26, 2025)
The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if
the patch files are signed before executing the containing run.sh
script. The signing process is kind of an HMAC with a long string as key
which is hard-coded in the firmware and is freely available for
download. This allows crafting malicious "signed" .patch files in order
to compromise the device and execute arbitrary code.
0
Attacker Value
Unknown
CVE-2024-9972
Disclosure Date: October 15, 2024 (last updated February 26, 2025)
Property Management System from ChanGate has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
0
Attacker Value
Unknown
CVE-2024-6207
Disclosure Date: October 14, 2024 (last updated February 26, 2025)
CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
0
Attacker Value
Unknown
CVE-2024-9923
Disclosure Date: October 14, 2024 (last updated February 26, 2025)
The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with administrator privileges to move arbitrary system files to the website root directory and access them.
0
Attacker Value
Unknown
CVE-2024-9922
Disclosure Date: October 14, 2024 (last updated February 26, 2025)
The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
0
Attacker Value
Unknown
CVE-2024-9921
Disclosure Date: October 14, 2024 (last updated February 26, 2025)
The Team+ from TEAMPLUS TECHNOLOGY does not properly validate specific page parameter, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify and delete database contents.
0
Attacker Value
Unknown
CVE-2024-5474
Disclosure Date: October 11, 2024 (last updated February 26, 2025)
A potential information disclosure vulnerability was reported in Lenovo's packaging of Dolby Vision Provisioning software prior to version 2.0.0.2 that could allow a local attacker to read files on the system with elevated privileges during installation of the package. Previously installed versions are not affected by this issue.
0
Attacker Value
Unknown
CVE-2024-9436
Disclosure Date: October 11, 2024 (last updated February 26, 2025)
The PublishPress Revisions: Duplicate Posts, Submit, Approve and Schedule Content Changes plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.5.14. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
0
Attacker Value
Unknown
CVE-2024-9799
Disclosure Date: October 10, 2024 (last updated February 26, 2025)
A vulnerability has been found in SourceCodester Profile Registration without Reload Refresh 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file add.php. The manipulation of the argument email_address/address/company_name/job_title/jobDescriptionparameter leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
0