Show filters
27 Total Results
Displaying 1-10 of 27
Sort by:
Attacker Value
Unknown

CVE-2024-12839

Disclosure Date: December 31, 2024 (last updated January 02, 2025)
The login mechanism via device authentication of CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability. If a user visits a forged website, the agent program deployed on their device will send an authentication signature to the website. An unauthenticated remote attacker who obtains this signature can use it to log into the system with any device.
Attacker Value
Unknown

CVE-2024-12838

Disclosure Date: December 31, 2024 (last updated January 02, 2025)
The passwordless login mechanism in CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability, allowing remote attackers with regular privileges to send a crafted request to switch to the identity of any user, including administrators.
Attacker Value
Unknown

CVE-2024-10653

Disclosure Date: November 01, 2024 (last updated November 04, 2024)
IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrative privileges to inject and execute OS commands on the server.
0
Attacker Value
Unknown

CVE-2024-10652

Disclosure Date: November 01, 2024 (last updated November 01, 2024)
IDExpert from CHANGING Information Technology does not properly validate a parameter for a specific functionality, allowing unauthenticated remote attackers to inject JavsScript code and perform Reflected Cross-site scripting attacks.
Attacker Value
Unknown

CVE-2024-10651

Disclosure Date: November 01, 2024 (last updated November 01, 2024)
IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrator privileges to exploit this vulnerability to read arbitrary system files.
Attacker Value
Unknown

CVE-2024-40723

Disclosure Date: August 02, 2024 (last updated August 10, 2024)
The specific API in HWATAIServiSign Windows Version from CHANGING Information Technology does not properly validate the length of server-side inputs. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the HWATAIServiSign, temporarily disrupting its service.
Attacker Value
Unknown

CVE-2024-40722

Disclosure Date: August 02, 2024 (last updated August 10, 2024)
The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service.
Attacker Value
Unknown

CVE-2024-40721

Disclosure Date: August 02, 2024 (last updated August 10, 2024)
The specific API in TCBServiSign Windows Version from CHANGING Information Technology does not properly validate server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause the TCBServiSign to load a DLL from an arbitrary path.
Attacker Value
Unknown

CVE-2024-40720

Disclosure Date: August 02, 2024 (last updated August 10, 2024)
The specific API in TCBServiSign Windows Version from CHANGING Information Technology does not properly validate server-side input. When a user visits a spoofed website, unauthenticated remote attackers can modify the `HKEY_CURRENT_USER` registry to execute arbitrary commands.
Attacker Value
Unknown

CVE-2024-40719

Disclosure Date: August 02, 2024 (last updated August 10, 2024)
The encryption strength of the authorization keys in CHANGING Information Technology TCBServiSign Windows Version is insufficient. When a remote attacker tricks a victim into visiting a malicious website, TCBServiSign will treat that website as a legitimate server and interact with it.