| TVN-202410003 |
互動資通 Team+ 企業私有雲溝通協作平台 - Arbitrary File Move through Path Traversal |
CVE-2024-9923 |
| TVN-202410002 |
互動資通 Team+ 企業私有雲溝通協作平台 - Arbitrary File Read through Path Traversal |
CVE-2024-9922 |
| TVN-202410001 |
互動資通Team+企業私有雲溝通協作平台 - SQL Injection |
CVE-2024-9921 |
| TVN-202409015 |
普萊德科技交換器設備 - Cleartext storage of SNMPv3 users' passwords |
CVE-2024-8459 |
| TVN-202409014 |
普萊德科技交換器設備 - Cross-site Request Forgery |
CVE-2024-8458 |
| TVN-202409013 |
普萊德科技交換器設備 - Stored cross-site scripting (XSS) in the User Management |
CVE-2024-8457 |
| TVN-202409012 |
普萊德科技交換器設備 - Missing Authentication for multiple HTTP routes |
CVE-2024-8456 |
| TVN-202409011 |
普萊德科技交換器設備 - Swctrl service exchanges weakly encoded passwords |
CVE-2024-8455 |
| TVN-202409010 |
普萊德科技交換器設備 - Swctrl service DoS attack |
CVE-2024-8454 |
| TVN-202409009 |
普萊德科技交換器設備 - Weak hash for users' passwords |
CVE-2024-8453 |
| TVN-202409008 |
普萊德科技交換器設備 - Insecure hash functions used for SNMPv3 credentials |
CVE-2024-8452 |
| TVN-202409007 |
普萊德科技交換器設備 - SSH server DoS attack |
CVE-2024-8451 |
| TVN-202409006 |
普萊德科技交換器設備 - Hard-coded SNMPv1 read-write community string |
CVE-2024-8450 |
| TVN-202409005 |
普萊德科技交換器設備 - Local users' passwords recovery through hard-coded credentials |
CVE-2024-8449 |
| TVN-202409004 |
普萊德科技交換器設備 - Remote privilege escalation using hard-coded credentials |
CVE-2024-8448 |
| TVN-202409027 |
基點資訊 Secure Email Gateway - Buffer Overflow |
CVE-2024-9043 |
| TVN-202409026 |
凌群電腦 OMFLOW - Exposure of Sensitive Data |
CVE-2024-8969 |
| TVN-202409025 |
D-Link 無線路由器 - OS Command Injection |
CVE-2024-45698 |
| TVN-202409024 |
D-Link 無線路由器 - Hidden Functionality |
CVE-2024-45697 |
| TVN-202409023 |
D-Link 無線路由器 - Hidden Functionality |
CVE-2024-45696 |