6.5
CVE-2024-41972 - WAGO: Arbitrary File Overwrite Leading to Privileged File Read in Multiple Devices
A low privileged remote attacker can overwrite an arbitrary file on the filesystem which may lead to an arbitrary file read with root privileges.
7.5
CVE-2024-42384 - Integer Overflow or Wraparound in Mongoose Web Server library
Integer Overflow or Wraparound vulnerability in Cesanta Mongoose Web Server v7.14 allows an attacker to send an unexpected TLS packet and produce a segmentation fault on the application.
8.1
CVE-2024-41971 - WAGO: Arbitrary File Overwrite in Multiple Devices
A low privileged remote attacker can overwrite an arbitrary file on the filesystem leading to a DoS and data loss.
5.7
CVE-2024-41970 - WAGO: Unauthorized Diagnostic Data Exposure in Multiple Devices
A low privileged remote attacker may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources.
4.2
CVE-2024-42383 - Use of Out-of-range Pointer Offset in Mongoose Web Server library
Use of Out-of-range Pointer Offset vulnerability in Cesanta Mongoose Web Server v7.14 allows to write a NULL byte value beyond the memory space dedicated for the hostname field.
8.8
CVE-2024-41969 - WAGO: CODESYS V3 Configuration Authentication Bypass in Multiple Devices
A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS.
8.1
CVE-2024-41967 - WAGO: Boot Mode Manipulation in Multiple Devices
A low privileged remote attacker may modify the boot mode configuration setup of the device, leading to modification of the firmware upgrade process or a denial-of-service attack.
5.4
CVE-2024-41968 - WAGO: Docker Settings Manipulation in Multiple Devices
A low privileged remote attacker may modify the docker settings setup of the device, leading to a limited DoS.
8.8
CVE-2024-41151 - Apache HertzBeat: RCE by notice template injection vulnerability
Deserialization of Untrusted Data vulnerability in Apache HertzBeat. This vulnerability can only be exploited by authorized attackers. This issue affects Apache HertzBeat: before 1.6.1. Users are recommended to upgrade to version 1.6.1, which fixes the issue.
7.5
CVE-2024-45791 - Apache HertzBeat: Exposure sensitive token via http GET method with query string
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache HertzBeat. This issue affects Apache HertzBeat: before 1.6.1. Users are recommended to upgrade to version 1.6.1, which fixes the issue.