CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Improper Certificate Validation (CWE-295) in the Gallagher Command Centre SALTO integration allowed an attacker to spoof the SALTO server.
This issue affects all versions of Gallagher Command Centre prior to 9.20.1043. |
Improper Certificate Validation vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Analyzer probe component) allows Man in the Middle Attack.This issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.1-00.
|
An improper certificate validation vulnerability has been reported to affect Helpdesk. If exploited, the vulnerability could allow remote attackers to compromise the security of the system.
We have already fixed the vulnerability in the following version:
Helpdesk 3.3.3 and later |
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series main modules allows a remote unauthenticated attacker to cancel the password/keyword setting and login to the affected products by sending specially crafted packets. |
An Improper Certificate Validation vulnerability could allow an authenticated malicious actor with access to UniFi Protect Cameras adjacent network to make unsupported changes to the camera system. |
MicroDicom DICOM Viewer version 2024.03
fails to adequately verify the update server's certificate, which could make it possible for attackers in a privileged network position to alter network traffic and carry out a machine-in-the-middle (MITM) attack. This allows the attackers to modify the server's response and deliver a malicious update to the user. |
Microsoft Excel Spoofing Vulnerability |
Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft Edge for Android Spoofing Vulnerability |
Microsoft Edge for iOS Spoofing Vulnerability |
Microsoft OneNote Spoofing Vulnerability |
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability |
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft Exchange Server Spoofing Vulnerability |
Microsoft Exchange Server Remote Code Execution Vulnerability |