CISA and the Environmental Protection Agency (EPA) warned water facilities today to secure Internet-exposed Human Machine Interfaces (HMIs) from cyberattacks. [...]
A vulnerability, which was classified as critical, has been found in Tenda G3 15.11.0.20. This issue affects the function formSetDebugCfg of the file /goform/setDebugCfg. The manipulation of the argument enable/level/module leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2024-8224. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in GitLab Enterprise Edition up to 17.2.8/17.3.4/17.4.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Pipeline Handler. The manipulation leads to missing authentication.
This vulnerability is known as CVE-2024-9164. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Dell Secure Connect Gateway 5.24.00.14. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to risky cryptographic algorithm.
This vulnerability is handled as CVE-2024-48016. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Dell Secure Connect Gateway 5.24.00.14. This affects an unknown part. The manipulation leads to improper certificate validation.
This vulnerability is uniquely identified as CVE-2024-47241. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as very critical was found in Synology BeePhotos and Photos. Affected by this vulnerability is an unknown functionality of the component Task Manager. The manipulation leads to command injection.
This vulnerability is known as CVE-2024-10443. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in cURL. Affected is an unknown function. The manipulation leads to comparison using wrong factors.
This vulnerability is traded as CVE-2024-9681. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in GitLab Community Edition and Enterprise Edition up to 17.3.5/17.4.2/17.5.0 and classified as critical. Affected by this issue is some unknown functionality of the component XML Manifest File Handler. The manipulation leads to allocation of resources.
This vulnerability is handled as CVE-2024-6826. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in GitLab Community Edition and Enterprise Edition up to 17.3.5/17.4.2/17.5.0. It has been classified as problematic. This affects an unknown part of the component Diff View. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-8312. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in XFree86 X11r6 up to 4.0.3. This affects an unknown part of the component xdm. The manipulation as part of FORWARD_QUERY Request leads to memory corruption.
This vulnerability is uniquely identified as CVE-2000-0491. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in 389-ds-base. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2022-1949. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Mattermost up to 8.1.9/9.2.5/9.3.1/9.4.2. It has been rated as problematic. This issue affects some unknown processing of the component Mention Handler. The manipulation leads to resource consumption.
The identification of this vulnerability is CVE-2024-2446. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Mattermost up to 8.1.9/9.2.5/9.3.1/9.4.2/9.5.0. Affected is an unknown function of the component SAML Handler. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2024-2450. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in GitLab up to 16.10.5/16.11.2/17.0.0. It has been classified as problematic. This affects an unknown part of the component Naming Convention Handler. The manipulation leads to authorization bypass.
This vulnerability is uniquely identified as CVE-2024-5258. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this issue is the function setDiagnosisCfg. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2024-8076. The attack may be launched remotely. There is no exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been classified as critical. This affects the function setTracerouteCfg. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2024-8077. It is possible to initiate the attack remotely. There is no exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.