Show filters
67 Total Results
Displaying 1-10 of 67
Sort by:
Attacker Value
Unknown

CVE-2025-23609

Disclosure Date: January 22, 2025 (last updated January 23, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Helmuth Lammer Tagesteller allows Reflected XSS. This issue affects Tagesteller: from n/a through v.1.1.
0
Attacker Value
Unknown

CVE-2024-45276

Disclosure Date: October 15, 2024 (last updated January 24, 2025)
An unauthenticated remote attacker can get read access to files in the "/tmp" directory due to missing authentication.
0
Attacker Value
Unknown

CVE-2024-45275

Disclosure Date: October 15, 2024 (last updated October 18, 2024)
The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
Attacker Value
Unknown

CVE-2024-45274

Disclosure Date: October 15, 2024 (last updated October 18, 2024)
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
Attacker Value
Unknown

CVE-2024-45273

Disclosure Date: October 15, 2024 (last updated October 18, 2024)
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
Attacker Value
Unknown

CVE-2024-45272

Disclosure Date: October 15, 2024 (last updated October 18, 2024)
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
Attacker Value
Unknown

CVE-2024-45271

Disclosure Date: October 15, 2024 (last updated October 22, 2024)
An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
Attacker Value
Unknown

CVE-2024-5672

Disclosure Date: July 03, 2024 (last updated February 14, 2025)
A high privileged remote attacker can execute arbitrary system commands via GET requests due to improper neutralization of special elements used in an OS command.
0
Attacker Value
Unknown

CVE-2019-25210

Disclosure Date: March 03, 2024 (last updated February 12, 2025)
An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values). Also, it is not the Helm Project's responsibility if a user decides to use --dry-run within a CI/CD environment whose output is visible to unauthorized persons.
Attacker Value
Unknown

CVE-2024-26147

Disclosure Date: February 21, 2024 (last updated January 12, 2025)
Helm is a package manager for Charts for Kubernetes. Versions prior to 3.14.2 contain an uninitialized variable vulnerability when Helm parses index and plugin yaml files missing expected content. When either an `index.yaml` file or a plugins `plugin.yaml` file were missing all metadata a panic would occur in Helm. In the Helm SDK, this is found when using the `LoadIndexFile` or `DownloadIndexFile` functions in the `repo` package or the `LoadDir` function in the `plugin` package. For the Helm client this impacts functions around adding a repository and all Helm functions if a malicious plugin is added as Helm inspects all known plugins on each invocation. This issue has been resolved in Helm v3.14.2. If a malicious plugin has been added which is causing all Helm client commands to panic, the malicious plugin can be manually removed from the filesystem. If using Helm SDK versions prior to 3.14.2, calls to affected functions can use `recover` to catch the panic.