CVE Alert: CVE-2024-8451
Vulnerability Summary: CVE-2024-8451 Certain switch models from PLANET Technology have an SSH service that improperly handles insufficiently authenticated connection requests,...
Vulnerability Summary: CVE-2024-8451 Certain switch models from PLANET Technology have an SSH service that improperly handles insufficiently authenticated connection requests,...
Vulnerability Summary: CVE-2024-8452 Certain switch models from PLANET Technology only support obsolete algorithms for authentication protocol and encryption protocol in...
Vulnerability Summary: CVE-2024-8448 Certain switch models from PLANET Technology have a hard-coded credential in the specific command-line interface, allowing remote...
Vulnerability Summary: CVE-2024-8450 Certain switch models from PLANET Technology have a Hard-coded community string in the SNMPv1 service, allowing unauthorized...
Vulnerability Summary: CVE-2024-6394 A Local File Inclusion vulnerability exists in parisneo/lollms-webui versions below v9.8. The vulnerability is due to unverified...
Vulnerability Summary: CVE-2024-8455 The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models,...
Vulnerability Summary: CVE-2024-45200 In Nintendo Mario Kart 8 Deluxe before 3.0.3, the LAN/LDN local multiplayer implementation allows a remote attacker...
Vulnerability Summary: CVE-2024-41999 Smart-tab Android app installed April 2023 or earlier contains an active debug code vulnerability. If this vulnerability...
Vulnerability Summary: CVE-2024-42496 Smart-tab Android app installed April 2023 or earlier contains an issue with plaintext storage of a password....
Vulnerability Summary: CVE-2024-8456 Certain switch models from PLANET Technology lack proper access control in firmware upload and download functionality, allowing...
Vulnerability Summary: CVE-2024-8457 Certain switch models from PLANET Technology have a web application that does not properly validate specific parameters,...
Vulnerability Summary: CVE-2024-8458 Certain switch models from PLANET Technology have a web application that is vulnerable to Cross-Site Request Forgery...
Vulnerability Summary: CVE-2024-8454 The swctrl service is used to detect and remotely manage PLANET Technology devices. Certain switch models have...
Vulnerability Summary: CVE-2024-8453 Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being...
Vulnerability Summary: CVE-2024-8459 Certain switch models from PLANET Technology store SNMPv3 users' passwords in plaintext within the configuration files, allowing...
Vulnerability Summary: CVE-2024-46313 TP-Link WR941ND V6 has a stack overflow vulnerability in the ssid parameter in /userRpm/popupSiteSurveyRpm.htm. Affected Endpoints: No...
Vulnerability Summary: CVE-2024-47641 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloperr Confetti Fall...
Vulnerability Summary: CVE-2024-47172 Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An...
Vulnerability Summary: CVE-2024-45772 Deserialization of Untrusted Data vulnerability in Apache Lucene Replicator. This issue affects Apache Lucene's replicator module: from...
Vulnerability Summary: CVE-2024-45920 A Stored Cross-Site Scripting (XSS) vulnerability in Solvait 24.4.2 allows remote attackers to inject malicious scripts into...
Vulnerability Summary: CVE-2024-46510 ESAFENET CDG v5 was discovered to contain a SQL injection vulnerability via the id parameter in the...
Vulnerability Summary: CVE-2024-47530 Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by...
Vulnerability Summary: CVE-2024-46293 Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Incorrect Access Control. There is a lack of...
Vulnerability Summary: CVE-2024-46280 PIX-LINK LV-WR22 RE3002-P1-01_V117.0 is vulnerable to Improper Access Control. The TELNET service is enabled with weak credentials...