5.3
CVE-2024-9975 - SourceCodester Drag and Drop Image Upload upload.php unrestricted upload
A vulnerability was found in SourceCodester Drag and Drop Image Upload 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /upload.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosedβ¦
9.1
CVE-2024-49388 -
Sensitive information manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
7.5
CVE-2024-49387 -
Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
4.3
CVE-2024-49384 -
Excessive attack surface in acep-collector service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
4.3
CVE-2024-49383 -
Excessive attack surface in acep-importer service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
4.3
CVE-2024-49382 -
Excessive attack surface in archive-server service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
7.5
CVE-2024-45276 - MB connect line/Helmholz: tmp directory exposed via webservice
An unauthenticated remote attacker can get read access to files in the "/tmp" directory due to missing authentication.
9.8
CVE-2024-45275 - MB connect line/Helmholz: Hardcoded user accounts with hard-coded passwords
The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
9.8
CVE-2024-45274 - MB connect line/Helmholz: Remote code execution via confnet service
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
8.4
CVE-2024-45273 - MB connect line/Helmholz: Weak encryption of configuration file
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.