TVN-202409009 |
PLANET Technology switch devices - Weak hash for users' passwords |
CVE-2024-8453 |
TVN-202409008 |
PLANET Technology switch devices - Insecure hash functions used for SNMPv3 credentials |
CVE-2024-8452 |
TVN-202409007 |
PLANET Technology switch devices - SSH server DoS attack |
CVE-2024-8451 |
TVN-202409006 |
PLANET Technology switch devices - Hard-coded SNMPv1 read-write community string |
CVE-2024-8450 |
TVN-202409005 |
PLANET Technology switch devices - Local users' passwords recovery through hard-coded credentials |
CVE-2024-8449 |
TVN-202409004 |
PLANET Technology switch devices - Remote privilege escalation using hard-coded credentials |
CVE-2024-8448 |
TVN-202409027 |
Cellopoint Secure Email Gateway - Buffer Overflow |
CVE-2024-9043 |
TVN-202409026 |
The SYSCOM Group OMFLOW - Exposure of Sensitive Data |
CVE-2024-8969 |
TVN-202409025 |
D-Link WiFi router - OS Command Injection |
CVE-2024-45698 |
TVN-202409024 |
D-Link WiFi router - Hidden Functionality |
CVE-2024-45697 |
TVN-202409023 |
D-Link WiFi router - Hidden Functionality |
CVE-2024-45696 |
TVN-202409022 |
D-Link WiFi router - Stack-based Buffer Overflow |
CVE-2024-45695 |
TVN-202409021 |
D-Link WiFi router - Stack-based Buffer Overflow |
CVE-2024-45694 |
TVN-202409020 |
The SYSCOM Group OMFLOW - Improper Authorization for Data Query Function |
CVE-2024-8780 |
TVN-202409019 |
The SYSCOM Group OMFLOW - Broken Access Control |
CVE-2024-8779 |
TVN-202409018 |
The SYSCOM Group OMFLOW - Arbitrary File Read |
CVE-2024-8778 |
TVN-202409017 |
The SYSCOM Group OMFLOW - Information Leakage |
CVE-2024-8777 |
TVN-202409016 |
INTUMIT SmartRobot - Cross-site Scripting |
CVE-2024-8776 |
TVN-202409003 |
Uniong WebITR - Open Redirect |
CVE-2024-8586 |
TVN-202409002 |
LEARNING DIGITAL Orca HCM - Arbitrary File Download |
CVE-2024-8585 |