A vulnerability has been found in G Data Total Security and classified as critical. This vulnerability affects unknown code. The manipulation leads to permission issues.
This vulnerability was named CVE-2024-6871. The attack needs to be approached locally. There is no exploit available.
A vulnerability was found in Siemens Tecnomatix Plant Simulation. It has been classified as critical. This affects an unknown part of the component WRL File Handler. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2024-52566. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Siemens Tecnomatix Plant Simulation. It has been rated as very critical. This issue affects some unknown processing of the component WRL File Handler. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2024-52568. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Siemens Tecnomatix Plant Simulation. Affected by this vulnerability is an unknown functionality of the component WRL File Handler. The manipulation leads to out-of-bounds write.
This vulnerability is known as CVE-2024-52570. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Siemens Tecnomatix Plant Simulation. Affected by this issue is some unknown functionality of the component WRL File Handler. The manipulation leads to out-of-bounds write.
This vulnerability is handled as CVE-2024-52571. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Siemens Tecnomatix Plant Simulation and classified as critical. This vulnerability affects unknown code of the component WRL File Handler. The manipulation leads to out-of-bounds write.
This vulnerability was named CVE-2024-52573. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument sername leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-11591. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. This issue affects some unknown processing of the file /admin/network/diag_ping6. The manipulation of the argument diag_ping6 leads to command injection.
The identification of this vulnerability is CVE-2024-11656. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/network/ajax_getChannelList. The manipulation of the argument countryCode leads to command injection.
This vulnerability is known as CVE-2024-11658. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical has been found in Sharp/Toshiba Tec MFP. Affected is an unknown function of the component Telnet. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2024-33616. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Progress WhatsUp Gold up to 2024.0.0. It has been classified as critical. This affects an unknown part. The manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-46907. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Progress WhatsUp Gold up to 2024.0.0. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to sql injection.
This vulnerability was named CVE-2024-46908. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Tenda FH451, FH1201, FH1202 and FH1206 up to 20241129. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference.
This vulnerability is known as CVE-2024-12002. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/sn_package/sn_https. The manipulation of the argument https_enable leads to command injection.
This vulnerability is known as CVE-2024-11652. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. This affects an unknown part of the file /admin/network/diag_traceroute6. The manipulation of the argument diag_traceroute6 leads to command injection.
This vulnerability is uniquely identified as CVE-2024-11654. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in Siemens Tecnomatix Plant Simulation. Affected is an unknown function of the component WRL File Handler. The manipulation leads to out-of-bounds write.
This vulnerability is traded as CVE-2024-52565. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.