Show filters
2,048 Total Results
Displaying 81-90 of 2,048
Sort by:
Attacker Value
Unknown

CVE-2024-25582

Disclosure Date: August 19, 2024 (last updated February 26, 2025)
Module savepoints could be abused to inject references to malicious code delivered through the same domain. Attackers could perform malicious API requests or extract information from the users account. Exploiting this vulnerability requires temporary access to an account or successful social engineering to make a user follow a prepared link to a malicious account. Please deploy the provided updates and patch releases. The savepoint module path has been restricted to modules that provide the feature, excluding any arbitrary or non-existing modules. No publicly available exploits are known.
0
Attacker Value
Unknown

CVE-2023-47728

Disclosure Date: August 16, 2024 (last updated February 26, 2025)
IBM QRadar Suite Software 1.10.12.0 through 1.10.22.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the request. This information could be used in further attacks against the system. IBM X-Force ID: 272201.
Attacker Value
Unknown

CVE-2024-25024

Disclosure Date: August 15, 2024 (last updated February 26, 2025)
IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 281430.
Attacker Value
Unknown

CVE-2024-28799

Disclosure Date: August 14, 2024 (last updated February 26, 2025)
IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 displays sensitive data improperly to a local privileged user, in non default configurations, during back-end commands which may result in the unexpected disclosure of this information. IBM X-Force ID: 287173.
Attacker Value
Unknown

CVE-2023-43747

Disclosure Date: August 14, 2024 (last updated February 26, 2025)
Incorrect default permissions for some Intel(R) Connectivity Performance Suite software installers before version 2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown

CVE-2024-7113

Disclosure Date: August 13, 2024 (last updated February 26, 2025)
If exploited, this vulnerability could cause a SuiteLink server to consume excessive system resources and slow down processing of Data I/O for the duration of the attack.
0
Attacker Value
Unknown

CVE-2022-38382

Disclosure Date: August 13, 2024 (last updated February 26, 2025)
IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 does not invalidate session after logout which could allow another authenticated user to obtain sensitive information. IBM X-Force ID: 233672.
Attacker Value
Unknown

CVE-2023-40261

Disclosure Date: August 08, 2024 (last updated February 26, 2025)
Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR17, 4.0.0 SR07, 4.1.0 SR04, 4.2.0 SR04, and 4.3.0 SR02 fails to validate file attributes during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk.
Attacker Value
Unknown

CVE-2023-33206

Disclosure Date: August 08, 2024 (last updated February 26, 2025)
Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR16, 4.0.0 SR06, 4.1.0 SR04, 4.2.0 SR03, and 4.3.0 SR01 fails to validate symlinks during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk.
Attacker Value
Unknown

CVE-2023-28865

Disclosure Date: August 08, 2024 (last updated February 26, 2025)
Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR15, 4.0.0 SR05, 4.1.0 SR03, and 4.2.0 SR02 fails to validate the directory contents of certain directories (e.g., ensuring the expected hash sum) during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk.