A vulnerability classified as critical was found in INNEO Startup TOOLS up to 2018 M040 13.0.70.3804. Affected by this vulnerability is an unknown functionality of the file sut_srv.exe of the component Service Port 85. The manipulation leads to path traversal.
This vulnerability is known as CVE-2020-15492. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Fake AI video generators infect Windows, macOS with infostealers How Italy became an unexpected spyware hub Babble Babble Babble Babble Babble Babble BabbleLoader One Sock Fits All: The use and abuse of the NSOCKS botnet Helldown […]
A vulnerability was found in Schneider Electric PowerLogic PM55xx, PowerLogic PM8ECC, PowerLogic EGX100 and PowerLogic EGX300. It has been classified as critical. This affects an unknown part of the component Modbus TCP Protocol Handler. The manipulation leads to improper authentication.
This vulnerability is uniquely identified as CVE-2021-22764. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection.
This vulnerability is known as CVE-2024-10914. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in Palo Alto Networks PAN-OS. It has been classified as critical. Affected is an unknown function of the component Management Web Interface. The manipulation leads to os command injection.
This vulnerability is traded as CVE-2024-9474. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cisco 7960 Router and classified as problematic. This issue affects some unknown processing of the component Firmware. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2007-1542. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in welliamcao OpsManage 3.0.1/3.0.2/3.0.3/3.0.4/3.0.5. It has been rated as critical. This issue affects the function deploy_host_vars of the file /apps/api/views/deploy_api.py of the component API Endpoint. The manipulation leads to deserialization.
The identification of this vulnerability is CVE-2024-11662. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Codezips Free Exam Hall Seating Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file profile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload.
This vulnerability was named CVE-2024-11661. The attack can be initiated remotely. There is no exploit available.
The researcher submit confuses the vulnerability class of this issue.
A vulnerability was found in code-projects Farmacia 1.0. It has been classified as problematic. This affects an unknown part of the file usuario.php. The manipulation of the argument name leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-11660. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
Other parameters might be affected as well.
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. A cyberattack on gambling giant IGT disrupted portions of its IT systems China-linked APT Gelsemium uses a new Linux […]
A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/network/diag_iperf. The manipulation of the argument iperf leads to command injection.
This vulnerability is handled as CVE-2024-11659. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/network/ajax_getChannelList. The manipulation of the argument countryCode leads to command injection.
This vulnerability is known as CVE-2024-11658. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.