A vulnerability has been found in Ruijie Reyee OS and classified as problematic. This vulnerability affects unknown code of the component Raw WiFi Signal Handler. The manipulation leads to transmission of private resources into a new sphere ('resource leak').
This vulnerability was named CVE-2024-47146. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in Ruijie Reyee OS. This affects an unknown part of the component MQTT Message Handler. The manipulation leads to use of inherently dangerous function.
This vulnerability is uniquely identified as CVE-2024-52324. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Ruijie Reyee OS. Affected by this issue is some unknown functionality of the component Proxy Server. The manipulation leads to server-side request forgery.
This vulnerability is handled as CVE-2024-48874. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Ruijie Reyee OS. Affected by this vulnerability is an unknown functionality of the component MQTT. The manipulation leads to improper handling of insufficient permissions or privileges.
This vulnerability is known as CVE-2024-46874. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Ruijie Reyee OS. Affected is an unknown function of the component MQTT Broker. The manipulation leads to improper neutralization of wildcards or matching symbols.
This vulnerability is traded as CVE-2024-47791. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ruijie Reyee OS. It has been rated as problematic. This issue affects some unknown processing of the component MQTT Credential Handler. The manipulation leads to use of weak credentials.
The identification of this vulnerability is CVE-2024-45722. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ruijie Reyee OS. It has been declared as problematic. This vulnerability affects unknown code of the component Phone Number Handler. The manipulation leads to insecure storage of sensitive information.
This vulnerability was named CVE-2024-47043. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ruijie Reyee OS. It has been classified as problematic. This affects an unknown part of the component Session Handler. The manipulation leads to premature release of resource during expected lifetime.
This vulnerability is uniquely identified as CVE-2024-51727. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ruijie Reyee OS and classified as problematic. Affected by this issue is some unknown functionality of the component Cloud Account Handler. The manipulation leads to exposure of private personal information to an unauthorized actor.
This vulnerability is handled as CVE-2024-42494. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Ruijie Reyee OS up to 3.1/9.4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Forgotten Password Handler. The manipulation leads to weak password recovery.
This vulnerability is known as CVE-2024-47547. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Platform Used for Drugs, Arms trafficking, and Money Laundering French and Dutch police led the takedown of an encrypted messaging platform used in international drug and arms trafficking. Dutch police discovered the app, named Matrix, on the phone of a criminal convicted in 2021 of murdering a journalist.
Flaws in Fuji's Tellus and V-Server Software Pose Risks to Critical Infrastructure Security researchers have uncovered 16 zero-day vulnerabilities in Japanese equipment manufacturer Fuji Electric's Tellus and V-Server remote monitoring software that enable attackers to execute malicious code in devices commonly used by utilities and other critical infrastructure providers.
Buy of Washington D.C.-Area Firm Adds Reverse Engineering, Data Analytics Expertise Sixgen will enhance its cybersecurity operations through the purchase of Washington D.C.-area Kyrus. The move introduces reverse engineering and analytics expertise to Sixgen's portfolio, aligning with its mission to protect critical infrastructure and bolster American cyber defense capabilities.
Russian Threat Actor Delivers NetSupport RAT, BurnsRAT via Fake Requests A malware campaign targeting Russian retailers and service businesses aims to deploy remote access tools and install infostealer malware. Kaspersky dubbed the campaign "Horns&Hooves," after a fake organization set up by fraudsters in the 1931 Soviet satirical novel "The Little Golden Calf."
A vulnerability classified as problematic was found in Responsive Lightbox & Gallery Plugin on WordPress. This vulnerability affects unknown code of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-5020. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Visual Portfolio, Photo Gallery & Post Grid Plugin on WordPress. This issue affects some unknown processing of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-5020. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in WPC Smart Quick View for WooCommerce Plugin on WordPress. Affected is an unknown function of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-5020. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Gallery Plugin on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-5020. The attack can be launched remotely. There is no exploit available.