Show filters
213 Total Results
Displaying 91-100 of 213
Sort by:
Attacker Value
Unknown
CVE-2024-0832
Disclosure Date: January 31, 2024 (last updated February 10, 2024)
In Telerik Reporting versions prior to 2024 R1, a privilege elevation vulnerability has been identified in the applications installer component. In an environment where an existing Telerik Reporting install is present, a lower privileged user has the ability to manipulate the installation package to elevate their privileges on the underlying operating system.
0
Attacker Value
Unknown
CVE-2024-0219
Disclosure Date: January 31, 2024 (last updated February 10, 2024)
In Telerik JustDecompile versions prior to 2024 R1, a privilege elevation vulnerability has been identified in the applications installer component. In an environment where an existing Telerik JustDecompile install is present, a lower privileged user has the ability to manipulate the installation package to elevate their privileges on the underlying operating system.
0
Attacker Value
Unknown
CVE-2023-40052
Disclosure Date: January 18, 2024 (last updated January 27, 2024)
This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0
.
An attacker who can produce a malformed web request may cause the crash of a PASOE agent potentially disrupting the thread activities of many web application clients. Multiple of these DoS attacks could lead to the flooding of invalid requests as compared to the server’s remaining ability to process valid requests.
0
Attacker Value
Unknown
CVE-2023-40051
Disclosure Date: January 18, 2024 (last updated January 27, 2024)
This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. An attacker can formulate a request for a WEB transport that allows unintended file uploads to a server directory path on the system running PASOE. If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible.
0
Attacker Value
Unknown
CVE-2022-42884
Disclosure Date: January 17, 2024 (last updated January 25, 2024)
Missing Authorization vulnerability in ThemeinProgress WIP Custom Login.This issue affects WIP Custom Login: from n/a through 1.2.7.
0
Attacker Value
Unknown
CVE-2024-0396
Disclosure Date: January 17, 2024 (last updated January 30, 2024)
In Progress MOVEit Transfer versions released before 2022.0.10 (14.0.10), 2022.1.11 (14.1.11), 2023.0.8 (15.0.8), 2023.1.3 (15.1.3), an input validation issue was discovered. An authenticated user can manipulate a parameter in an HTTPS transaction. The modified transaction could lead to computational errors within MOVEit Transfer and potentially result in a denial of service.
0
Attacker Value
Unknown
CVE-2023-6784
Disclosure Date: December 20, 2023 (last updated December 29, 2023)
A malicious user could potentially use the Sitefinity system for the distribution of phishing emails.
0
Attacker Value
Unknown
CVE-2023-6595
Disclosure Date: December 14, 2023 (last updated October 16, 2024)
In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold.
0
Attacker Value
Unknown
CVE-2023-6368
Disclosure Date: December 14, 2023 (last updated October 16, 2024)
In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate information related to a registered device being monitored by WhatsUp Gold.
0
Attacker Value
Unknown
CVE-2023-6367
Disclosure Date: December 14, 2023 (last updated December 20, 2023)
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Roles.
If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
0