Vulnerabilities (CVE)

Filtered by CWE-453
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-30206 2025-04-16 N/A 9.8 CRITICAL
Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. This issue is patched in version 1.6.1. A workaround for this vulnerability involves replacing the hardcoded secret with a securely generated value and load it from secure configuration storage.
CVE-2024-49120 1 Microsoft 6 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 3 more 2025-01-14 N/A 8.1 HIGH
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2024-21411 1 Skype 1 Skype 2024-12-27 N/A 8.8 HIGH
Skype for Consumer Remote Code Execution Vulnerability
CVE-2024-39916 1 Fogproject 1 Fogproject 2024-11-21 N/A 6.4 MEDIUM
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. There is a security issue with the NFS configuration in /etc/exports generated by the installer that allows an attacker to modify files outside the export in the default installation. The exports have the no_subtree_check option. The no_subtree_check option means that if a client performs a file operation, the server will only check if the requested file is on the correct filesystem, not if it is in the correct directory. This enables modifying files in /images, accessing other files on the same filesystem, and accessing files on other filesystems. This vulnerability is fixed in 1.5.10.30.
CVE-2024-41255 2024-08-01 N/A 7.5 HIGH
filestash v0.4 is configured to skip TLS certificate verification when using the FTPS protocol, possibly allowing attackers to execute a man-in-the-middle attack via the Init function of index.go.