Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SFP Secondary Cluster: Weak Cryptography
Category ID:959
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
1231Vulnerabilities found

CVE-2024-47073
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-28.15% / 96.31%
||
7 Day CHG~0.00%
Published-07 Nov, 2024 | 17:31
Updated-20 Feb, 2025 | 16:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dataease arbitrary interface access vulnerability

DataEase is an open source data visualization analysis tool that helps users quickly analyze data and gain insights into business trends. In affected versions a the lack of signature verification of jwt tokens allows attackers to forge jwts which then allow access to any interface. The vulnerability has been fixed in v2.10.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-DataEase (FIT2CLOUD Inc.)
Product-dataeasedataeasedataease
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-51526
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-8.2||HIGH
EPSS-0.01% / 0.62%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 09:23
Updated-07 Nov, 2024 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Permission control vulnerability in the hidebug module Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-50356
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-Not Assigned
EPSS-0.12% / 31.91%
||
7 Day CHG+0.02%
Published-31 Oct, 2024 | 18:02
Updated-01 Nov, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Press has a potential 2FA bypass

Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.

Action-Not Available
Vendor-frappe
Product-press
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-50347
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 13.62%
||
7 Day CHG+0.01%
Published-31 Oct, 2024 | 17:56
Updated-01 Nov, 2024 | 12:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Laravel Reverb has Missing API Signature Verification

Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. Prior to 1.4.0, there is an issue where verification signatures for requests sent to Reverb's Pusher-compatible API were not being verified. This API is used in scenarios such as broadcasting a message from a backend service or for obtaining statistical information (such as number of connections) about a given channel. This issue only affects the Pusher-compatible API endpoints and not the WebSocket connections themselves. In order to exploit this vulnerability, the application ID which, should never be exposed, would need to be known by an attacker. This vulnerability is fixed in 1.4.0.

Action-Not Available
Vendor-laravel
Product-reverb
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-43382
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 6.14%
||
7 Day CHG~0.00%
Published-30 Oct, 2024 | 00:00
Updated-20 Aug, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Snowflake JDBC driver versions >= 3.2.6 and <= 3.19.1 have an Incorrect Security Setting that can result in data being uploaded to an encrypted stage without the additional layer of protection provided by client side encryption.

Action-Not Available
Vendor-snowflaken/asnowflake
Product-snowflake_jdbcn/asnowflake_jdbc
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-8036
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-4.6||MEDIUM
EPSS-0.03% / 4.94%
||
7 Day CHG~0.00%
Published-25 Oct, 2024 | 16:57
Updated-30 Oct, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthorized Modifications of Firmware and Configuration

ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.

Action-Not Available
Vendor-ABB
Product-ARM600RBX615Smart Substation Control and Protection SSC600Substation Merging Unit SMU615REF542plusRelion Protection Relays REF615 IECRelion Protection Relays REF615R ANSIREC603/RER603Relion Protection Relays 615 series IECRelion Protection Relays REX640Relion Protection Relays REX615ARG600/ARP600 dual SIMRER620 ANSIRelion Protection Relays 615 series ANSIREC601/RER601COM600Relion Protection Relays RE_611 IECRelion Protection Relays REF615 ANSIARG600/ARP600/ARR600/ARC600 single SIMRelion Protection Relays REX610Relion Protection Relays RED615 IECRE_630Relion Protection Relays 615 series CNSUE 3000Relion Protection Relays REC615RIO600620 Series IEC/CNSPA ZC-400SPA ZC-402Relion Protection Relays RER615COM600F ANSI
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-9302
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.1||HIGH
EPSS-0.43% / 61.38%
||
7 Day CHG~0.00%
Published-25 Oct, 2024 | 06:51
Updated-05 Nov, 2024 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
App Builder – Create Native Android & iOS Apps On The Flight <= 5.3.7 - Privilege Escalation and Account Takeover via Weak OTP

The App Builder – Create Native Android & iOS Apps On The Flight plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.3.7. This is due to the verify_otp_forgot_password() and update_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.

Action-Not Available
Vendor-appcheapappcheapappcheap
Product-app_builderApp Builder – Create Native Android & iOS Apps On The Flightapp_builder
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-48428
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.32% / 54.55%
||
7 Day CHG~0.00%
Published-25 Oct, 2024 | 00:00
Updated-19 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Olive VLE allows an attacker to obtain sensitive information via the reset password function.

Action-Not Available
Vendor-olivegroupn/a
Product-olivevlen/a
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-45259
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 6.54%
||
7 Day CHG~0.00%
Published-24 Oct, 2024 | 00:00
Updated-28 Oct, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted.

Action-Not Available
Vendor-n/agl-inet
Product-n/agl-x300b_firmwaregl-xe300_firmwaregl-mt6000_firmwaregl-b3000_firmwaregl-x750_firmware
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2023-6728
Assigner-Nokia
ShareView Details
Assigner-Nokia
CVSS Score-3.3||LOW
EPSS-0.01% / 1.44%
||
7 Day CHG~0.00%
Published-17 Oct, 2024 | 12:16
Updated-05 Nov, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nokia SR OS: BOF File Encryption Vulnerability

Nokia SR OS bof.cfg file encryption is vulnerable to a brute force attack. This weakness allows an attacker in possession of the encrypted file to decrypt the bof.cfg file and obtain the BOF configuration content.

Action-Not Available
Vendor-Nokia Corporation
Product-SR OS (7250 IXR, 7450 ESS, 7750 SR, 7950 IXR, VSR), 7705 SAR OS, 7210 SAS OS
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-9305
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.1||HIGH
EPSS-0.19% / 40.73%
||
7 Day CHG~0.00%
Published-16 Oct, 2024 | 02:05
Updated-17 May, 2025 | 02:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AppPresser – Mobile App Framework <= 4.4.4 - Privilege Escalation and Account Takeover via Weak OTP

The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.4. This is due to the appp_reset_password() and validate_reset_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.

Action-Not Available
Vendor-apppresserscottopolisapppresser
Product-apppresserAppPresser – Mobile App Frameworkapppresser
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-45273
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-8.4||HIGH
EPSS-0.03% / 5.70%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 10:27
Updated-17 Oct, 2024 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MB connect line/Helmholz: Weak encryption of configuration file

An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.

Action-Not Available
Vendor-mbconnectlinehelmholzHelmholzMB connect linemb_connect_linehelmholzmbconnectline
Product-mbnet.minirex_250_firmwarembspider_mdh_915_firmwaremymbconnect24mbnet_firmwarembspider_mdh_906_firmwarerex_200myrex24_v2_virtual_serverrex_250rex_100_firmwarembspider_mdh_916_firmwarerex_200_firmwarerex_300_firmwarembspider_mdh_906mbnet_hw1_firmwarembnet.mini_firmwarembspider_mdh_905mbconnect24mbspider_mdh_905_firmwarembnet_hw1mbnet.rokey_firmwarembnet.rokeyrex_100rex_300mbspider_mdh_915mbspider_mdh_916mbnetmbCONNECT24mbNET/mbNET.rokeyREX100mymbCONNECT24REX200/250mbNET HW1myREX24.virtualmbSPIDERmyREX24 V2REX300mbNET.minimbnet_mbnet.rokeymbnet.minimyrex24.virtualmyrex24_v2mymbconnect24rex300mbconnect24mbnet_hw1mbspiderrex_200rex100rex250
CWE ID-CWE-261
Weak Encoding for Password
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-47943
Assigner-SEC Consult Vulnerability Lab
ShareView Details
Assigner-SEC Consult Vulnerability Lab
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 49.08%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 08:57
Updated-17 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper signature verification of firmware upgrade files

The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code.

Action-Not Available
Vendor-RITTAL GmbH & Co. KG
Product-IoT Interface & CMC III Processing Unit
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-48948
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.8||MEDIUM
EPSS-0.07% / 22.60%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 00:00
Updated-20 Jun, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.

Action-Not Available
Vendor-indutnyn/aNode.js (OpenJS Foundation)
Product-ellipticn/aelliptic
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-9907
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.12% / 31.15%
||
7 Day CHG~0.00%
Published-13 Oct, 2024 | 04:31
Updated-15 Oct, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QileCMS Verification Code Forget.php sendEmail password recovery

A vulnerability classified as problematic was found in QileCMS up to 1.1.3. This vulnerability affects the function sendEmail of the file /qilecms/user/controller/Forget.php of the component Verification Code Handler. The manipulation leads to weak password recovery. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-n/aqilecms
Product-QileCMSqilecms
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-8531
Assigner-Schneider Electric
ShareView Details
Assigner-Schneider Electric
CVSS Score-7.2||HIGH
EPSS-0.15% / 36.20%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 13:50
Updated-15 Oct, 2024 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that could compromise the Data Center Expert software when an upgrade bundle is manipulated to include arbitrary bash scripts that are executed as root.

Action-Not Available
Vendor-
Product-Data Center Expertdata_center_expert
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-9487
Assigner-GitHub, Inc. (Products Only)
ShareView Details
Assigner-GitHub, Inc. (Products Only)
CVSS Score-9.5||CRITICAL
EPSS-37.46% / 97.07%
||
7 Day CHG-1.45%
Published-10 Oct, 2024 | 21:08
Updated-15 Nov, 2024 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
An Improper Verification of Cryptographic Signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed when the encrypted assertions feature was enabled

An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed resulting in unauthorized provisioning of users and access to the instance. Exploitation required the encrypted assertions feature to be enabled, and the attacker would require direct network access as well as a signed SAML response or metadata document. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.15 and was fixed in versions 3.11.16, 3.12.10, 3.13.5, and 3.14.2. This vulnerability was reported via the GitHub Bug Bounty program.

Action-Not Available
Vendor-GitHub, Inc.
Product-enterprise_serverEnterprise Serverenterprise_server
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-48949
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.13% / 33.23%
||
7 Day CHG~0.00%
Published-10 Oct, 2024 | 00:00
Updated-25 Mar, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation.

Action-Not Available
Vendor-indutnyn/a
Product-ellipticn/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-47832
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.25% / 48.09%
||
7 Day CHG~0.00%
Published-09 Oct, 2024 | 18:32
Updated-11 Oct, 2024 | 16:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XML Signature Bypass via differential XML parsing in ssoready

ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-ssoreadyssoready
Product-ssoreadyssoready
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-41594
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.08% / 23.91%
||
7 Day CHG~0.00%
Published-03 Oct, 2024 | 00:00
Updated-19 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in DrayTek Vigor310 devices through 4.3.2.6 allows an attacker to obtain sensitive information because the httpd server of the Vigor management UI uses a static string for seeding the PRNG of OpenSSL.

Action-Not Available
Vendor-n/aDrayTek Corp.
Product-vigor2762_firmwarevigor2765_firmwarevigor2952vigor2133_firmwarevigor2952_firmwarevigor3220_firmwarevigor2866_firmwarevigor2926vigor166vigorlte200_firmwarevigor3220vigor2915_firmwarevigor2766_firmwarevigor2962vigor2620vigor2832vigor2763vigor3912vigor1000bvigor1000b_firmwarevigor2832_firmwarevigor2765vigor2860_firmwarevigor2866vigor2763_firmwarevigor165_firmwarevigor2620_firmwarevigor2862_firmwarevigor166_firmwarevigor2865vigor2133vigor2762vigor2962_firmwarevigor2862vigor2135_firmwarevigor2926_firmwarevigor3912_firmwarevigor2925_firmwarevigorlte200vigor2865_firmwarevigor3910_firmwarevigor2915vigor2135vigor165vigor2766vigor3910vigor2860vigor2925n/a
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-21530
Assigner-Snyk
ShareView Details
Assigner-Snyk
CVSS Score-4.5||MEDIUM
EPSS-0.01% / 0.68%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 05:00
Updated-04 Oct, 2024 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object. **Note:** The issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng.

Action-Not Available
Vendor-n/acocoon
Product-cocooncocoon
CWE ID-CWE-323
Reusing a Nonce, Key Pair in Encryption
CVE-2024-33662
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.17%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 00:00
Updated-21 May, 2025 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Portainer before 2.20.2 improperly uses an encryption algorithm in the AesEncrypt function.

Action-Not Available
Vendor-portainern/aportainer
Product-portainern/aportainer
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-8455
Assigner-TWCERT/CC
ShareView Details
Assigner-TWCERT/CC
CVSS Score-8.1||HIGH
EPSS-0.10% / 29.00%
||
7 Day CHG~0.00%
Published-30 Sep, 2024 | 07:24
Updated-04 Oct, 2024 | 14:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PLANET Technology switch devices - Swctrl service exchanges weakly encoded passwords

The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords.

Action-Not Available
Vendor-planetPLANET Technologyplanet_technology_corp
Product-gs-4210-24p2sgs-4210-24p2s_firmwareigs-5225-4up1t2sgs-4210-24pl4cgs-4210-24pl4c_firmwareigs-5225-4up1t2s_firmwareGS-4210-24P2S hardware 3.0IGS-5225-4UP1T2S hardware 1.0GS-4210-24PL4C hardware 2.0gs-4210-24pl4c_hardware_2.0gs-4210-24pl4c_hardware_3.0igs-5225-4up1t2s_hardware_1.0
CWE ID-CWE-261
Weak Encoding for Password
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-23960
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-4.6||MEDIUM
EPSS-0.01% / 1.92%
||
7 Day CHG~0.00%
Published-28 Sep, 2024 | 06:20
Updated-03 Oct, 2024 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Alpine Halo9 Improper Verification of Cryptographic Signature Vulnerability

Alpine Halo9 Improper Verification of Cryptographic Signature Vulnerability. This vulnerability allows physically present attackers to bypass signature validation mechanism on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware metadata signature validation mechanism. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-23102

Action-Not Available
Vendor-alpsalpineAlpinealpine
Product-ilx-f509_firmwareilx-f509Halo9halo9
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-34542
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 8.73%
||
7 Day CHG~0.00%
Published-27 Sep, 2024 | 17:45
Updated-07 Oct, 2024 | 15:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Advantech ADAM-5630 Weak Encoding for Password

Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process.

Action-Not Available
Vendor-Advantech (Advantech Co., Ltd.)
Product-adam-5630_firmwareadam-5630ADAM-5630
CWE ID-CWE-261
Weak Encoding for Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2024-37187
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 4.27%
||
7 Day CHG~0.00%
Published-27 Sep, 2024 | 17:25
Updated-07 Oct, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Advantech ADAM-5550 Weak Encoding for Password

Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding.

Action-Not Available
Vendor-Advantech (Advantech Co., Ltd.)
Product-adam-5550adam-5550_firmwareADAM 5550
CWE ID-CWE-261
Weak Encoding for Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2024-47182
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.07% / 23.16%
||
7 Day CHG~0.00%
Published-27 Sep, 2024 | 13:58
Updated-04 Oct, 2024 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dozzle uses unsafe hash for passwords

Dozzle is a realtime log viewer for docker containers. Before version 8.5.3, the app uses sha-256 as the hash for passwords, which leaves users susceptible to rainbow table attacks. The app switches to bcrypt, a more appropriate hash for passwords, in version 8.5.3.

Action-Not Available
Vendor-amirraminfaramir20
Product-dozzledozzle
CWE ID-CWE-328
Use of Weak Hash
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-45980
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.15% / 36.79%
||
7 Day CHG~0.00%
Published-26 Sep, 2024 | 00:00
Updated-26 Sep, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A host header injection vulnerability in MEANStore 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.

Action-Not Available
Vendor-n/ameanstore
Product-n/ameanstore
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-7479
Assigner-TeamViewer Germany GmbH
ShareView Details
Assigner-TeamViewer Germany GmbH
CVSS Score-8.8||HIGH
EPSS-4.55% / 88.76%
||
7 Day CHG~0.00%
Published-25 Sep, 2024 | 10:34
Updated-26 Sep, 2024 | 13:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper signature verification of VPN driver installation in TeamViewer Remote Clients

Improper verification of cryptographic signature during installation of a VPN driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers.

Action-Not Available
Vendor-TeamViewer
Product-Remote Full ClientRemote Hosthostfull_client
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-7481
Assigner-TeamViewer Germany GmbH
ShareView Details
Assigner-TeamViewer Germany GmbH
CVSS Score-8.8||HIGH
EPSS-0.09% / 27.20%
||
7 Day CHG~0.00%
Published-25 Sep, 2024 | 10:33
Updated-26 Sep, 2024 | 13:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper signature verification of Printer driver installation in TeamViewer Remote Clients

Improper verification of cryptographic signature during installation of a Printer driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers.

Action-Not Available
Vendor-TeamViewer
Product-Remote Full ClientRemote Hosthost
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-40761
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-5.3||MEDIUM
EPSS-1.38% / 79.51%
||
7 Day CHG~0.00%
Published-25 Sep, 2024 | 07:31
Updated-10 Jul, 2025 | 21:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Answer: Avatar URL leaked user email addresses

Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead. Users are recommended to upgrade to version 1.4.0, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-answerApache Answeranswer
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-22892
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 27.87%
||
7 Day CHG~0.00%
Published-25 Sep, 2024 | 00:00
Updated-14 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSlides 4.0.15 was discovered to be using a weak hashing algorithm to store passwords.

Action-Not Available
Vendor-openslidesn/a
Product-openslidesn/a
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-8878
Assigner-CyberDanube
ShareView Details
Assigner-CyberDanube
CVSS Score-10||CRITICAL
EPSS-0.27% / 49.95%
||
7 Day CHG~0.00%
Published-24 Sep, 2024 | 15:14
Updated-27 Sep, 2024 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Password Reset

The password recovery mechanism for the forgotten password in Riello Netman 204 allows an attacker to reset the admin password and take over control of the device.This issue affects Netman 204: through 4.05.

Action-Not Available
Vendor-Rielloriello-ups
Product-Netman 204netman_204_firmware
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-39928
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.24%
||
7 Day CHG~0.00%
Published-24 Sep, 2024 | 07:27
Updated-16 May, 2025 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability

In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils. Users are recommended to upgrade to version 1.6.0, which fixes this issue.

Action-Not Available
Vendor-apache_software_foundationThe Apache Software Foundation
Product-linkisApache Linkis Spark EngineConnapache_linkis_spark_engineconn
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-8698
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.7||HIGH
EPSS-79.58% / 99.05%
||
7 Day CHG~0.00%
Published-19 Sep, 2024 | 15:48
Updated-27 Aug, 2025 | 14:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak-saml-core: improper verification of saml responses leading to privilege escalation in keycloak

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat build of Keycloak 22Red Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7.6 for RHEL 7Red Hat Build of KeycloakRed Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8Red Hat Single Sign-On 7.6 for RHEL 9Red Hat build of Keycloak 24RHEL-8 based Middleware ContainersRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat Single Sign-On 7.6 for RHEL 8
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-7788
Assigner-Document Foundation, The
ShareView Details
Assigner-Document Foundation, The
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.02%
||
7 Day CHG~0.00%
Published-17 Sep, 2024 | 14:28
Updated-12 Oct, 2024 | 13:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Signatures in "repair mode" should not be trusted

Improper Digital Signature Invalidation  vulnerability in Zip Repair Mode of The Document Foundation LibreOffice allows Signature forgery vulnerability in LibreOfficeThis issue affects LibreOffice: from 24.2 before < 24.2.5.

Action-Not Available
Vendor-libreofficeThe Document Foundationthedocumentfoundation
Product-libreofficeLibreOfficelibreoffice
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-45607
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.07% / 20.94%
||
7 Day CHG~0.00%
Published-12 Sep, 2024 | 19:58
Updated-19 Sep, 2024 | 02:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
whatsapp-api-js fails to validate message's signature

whatsapp-api-js is a TypeScript server agnostic Whatsapp's Official API framework. It's possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid. Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted. This vulnerability is fixed in 4.0.3.

Action-Not Available
Vendor-secreto31126Secreto31126
Product-whatsapp-api-jswhatsapp-api-js
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-8692
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.18% / 40.17%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 18:31
Updated-03 Oct, 2024 | 13:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TDuckCloud TDuckPro password recovery

A vulnerability classified as critical was found in TDuckCloud TDuckPro up to 6.3. Affected by this vulnerability is an unknown functionality. The manipulation leads to weak password recovery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-tduckcloudTDuckCloudtduckcloud
Product-tduckproTDuckProtduckpro
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-45409
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-10||CRITICAL
EPSS-12.64% / 93.71%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 18:50
Updated-11 Nov, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The Ruby SAML library vulnerable to a SAML authentication bypass via Incorrect XPath selector

The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.

Action-Not Available
Vendor-oneloginomniauthSAML-ToolkitsoneloginomniauthGitLab Inc.
Product-omniauth_samlgitlabruby-samlruby-samlruby-samlomniauth-saml
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-7318
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.34% / 56.32%
||
7 Day CHG~0.00%
Published-09 Sep, 2024 | 18:50
Updated-02 May, 2025 | 21:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak-core: one time passcode (otp) is valid longer than expiration timeseverity

A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute. A one time passcode that is valid longer than its expiration time increases the attack window for malicious actors to abuse the system and compromise accounts. Additionally, it increases the attack surface because at any given time, two OTPs are valid.

Action-Not Available
Vendor-Red Hat, Inc.
Product-build_of_keycloakRed Hat build of Keycloak 24Red Hat Build of Keycloak
CWE ID-CWE-324
Use of a Key Past its Expiration Date
CVE-2024-6572
Assigner-Checkmk GmbH
ShareView Details
Assigner-Checkmk GmbH
CVSS Score-6.3||MEDIUM
EPSS-0.09% / 26.84%
||
7 Day CHG~0.00%
Published-09 Sep, 2024 | 09:39
Updated-25 Aug, 2025 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper host key checking in active check 'Check SFTP Service' and special agent 'VNX quotas and filesystem'

Improper host key checking in active check 'Check SFTP Service' and special agent 'VNX quotas and filesystem' in Checkmk before Checkmk 2.3.0p15, 2.2.0p33, 2.1.0p48 and 2.0.0 (EOL) allows man-in-the-middle attackers to intercept traffic

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmkcheckmk
CWE ID-CWE-322
Key Exchange without Entity Authentication
CVE-2024-45394
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.01% / 1.14%
||
7 Day CHG~0.00%
Published-03 Sep, 2024 | 20:15
Updated-09 Oct, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Secret encryption vulnerable to brute-force attacks

Authenticator is a browser extension that generates two-step verification codes. In versions 7.0.0 and below, encryption keys for user data were stored encrypted at-rest using only AES-256 and the EVP_BytesToKey KDF. Therefore, attackers with a copy of a user's data are able to brute-force the user's encryption key. Users on version 8.0.0 and above are automatically migrated away from the weak encoding on first login. Users should destroy encrypted backups made with versions prior to 8.0.0.

Action-Not Available
Vendor-authenticatorAuthenticator-Extensionauthenticator-extension
Product-authenticatorAuthenticatorauthenticator
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-261
Weak Encoding for Password
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2021-38121
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Assigner-OpenText (formerly Micro Focus)
CVSS Score-8.3||HIGH
EPSS-0.03% / 5.72%
||
7 Day CHG~0.00%
Published-28 Aug, 2024 | 06:28
Updated-13 Sep, 2024 | 18:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Weak communication protocol identified in Advance Authentication client application

Insufficient or weak TLS protocol version identified in Advance authentication client server communication when specific service is accessed between devices.  This issue affects NetIQ Advance Authentication versions before 6.3.5.1

Action-Not Available
Vendor-Open Text CorporationMicro Focus International Limited
Product-netiq_advanced_authenticationNetIQ Advance Authenticationnetiq_advanced_authentication
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-38807
Assigner-VMware by Broadcom
ShareView Details
Assigner-VMware by Broadcom
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 2.52%
||
7 Day CHG~0.00%
Published-23 Aug, 2024 | 08:26
Updated-27 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2024-38807: Signature Forgery Vulnerability in Spring Boot's Loader

Applications that use spring-boot-loader or spring-boot-loader-classic and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-Spring Boot
CWE ID-CWE-290
Authentication Bypass by Spoofing
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-42915
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.04% / 11.64%
||
7 Day CHG~0.00%
Published-23 Aug, 2024 | 00:00
Updated-23 Aug, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A host header injection vulnerability in Staff Appraisal System v1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This will allow attackers to arbitrarily reset other users' passwords and compromise their accounts.

Action-Not Available
Vendor-n/astaff_appraisal_system
Product-n/astaff_appraisal_system
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-6800
Assigner-GitHub, Inc. (Products Only)
ShareView Details
Assigner-GitHub, Inc. (Products Only)
CVSS Score-9.5||CRITICAL
EPSS-0.55% / 66.95%
||
7 Day CHG~0.00%
Published-20 Aug, 2024 | 19:21
Updated-22 Aug, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when using SAML authentication with specific identity providers utilizing publicly exposed signed federation metadata XML. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Server to forge a SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program.

Action-Not Available
Vendor-GitHub, Inc.
Product-GitHub Enterprise Serverenterprise_server
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-21787
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.01% / 0.69%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-14 Aug, 2024 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inadequate encryption strength for some BMRA software before version 22.08 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/abmra_software
Product-BMRA softwarebmra_software
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-41681
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-6||MEDIUM
EPSS-0.05% / 16.32%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 07:54
Updated-14 Aug, 2024 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Location Intelligence family (All versions < V4.4). The web server of affected products is configured to support weak ciphers by default. This could allow an unauthenticated attacker in an on-path position to to read and modify any data passed over the connection between legitimate clients and the affected device.

Action-Not Available
Vendor-Siemens AG
Product-location_intelligenceLocation Intelligence family
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-42163
Assigner-CyberDanube
ShareView Details
Assigner-CyberDanube
CVSS Score-8.3||HIGH
EPSS-0.09% / 26.12%
||
7 Day CHG~0.00%
Published-12 Aug, 2024 | 11:21
Updated-29 Aug, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Password Manipulation

Insufficiently random values for generating password reset token in FIWARE Keyrock <= 8.4 allow attackers to take over the account of any user by predicting the token for the password reset link.

Action-Not Available
Vendor-fiwareFIWARE
Product-keyrockFIWARE Keyrock
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-21881
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-8.6||HIGH
EPSS-0.08% / 23.58%
||
7 Day CHG~0.00%
Published-10 Aug, 2024 | 17:44
Updated-11 Mar, 2025 | 13:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Upload of encrypted packages allows authenticated command execution in Enphase IQ Gateway v4.x and v5.x

Inadequate Encryption Strength vulnerability allow an authenticated attacker to execute arbitrary OS Commands via encrypted package upload.This issue affects Envoy: 4.x and 5.x

Action-Not Available
Vendor-Enphaseenphase
Product-Envoyenvoy
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-5800
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-8.3||HIGH
EPSS-0.07% / 22.73%
||
7 Day CHG~0.00%
Published-10 Aug, 2024 | 03:50
Updated-12 Aug, 2024 | 14:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Diffie-Hellman groups with insufficient strength used in SSL/TLS stack of B&R Automation Runtime

Diffie-Hellman groups with insufficient strength are used in the SSL/TLS stack of B&R Automation Runtime versions before 6.0.2, allowing a network attacker to decrypt the SSL/TLS communication.

Action-Not Available
Vendor-B&R Industrial Automation GmbH
Product-Automation Runtime
CWE ID-CWE-326
Inadequate Encryption Strength
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 24
  • 25
  • Next