7.5

CVSS3.1

CVE-2024-8927 - cgi.force_redirect configuration is bypassable due to the environment variable collision

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12,Β HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP he…

πŸ“… Published: Oct. 7, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:17 p.m.

3.1

CVSS3.1

CVE-2024-8925 - Erroneous parsing of multipart form data

In PHP versionsΒ 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to…

πŸ“… Published: Oct. 7, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:17 p.m.

9.8

CVSS3.1

CVE-2024-46076 -

RuoYi v4.7.9 and before has a security flaw that allows escaping from comments within the code generation feature, enabling the injection of malicious code.

πŸ“… Published: Oct. 7, 2024, midnight πŸ”„ Last Modified: May 15, 2025, 9:32 a.m.

8.8

CVSS3.1

CVE-2024-46041 -

IoT Haat Smart Plug IH-IN-16A-S v5.16.1 is vulnerable to Authentication Bypass by Capture-replay.

πŸ“… Published: Oct. 7, 2024, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

6.5

CVSS3.1

CVE-2024-46040 -

IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1 suffers from Insufficient Session Expiration. The lack of validation of the authentication token at the IoT Haat during the Access Point Pairing mode leads the attacker to replay the Wi-Fi packets and forcefully turn off the access point after the…

πŸ“… Published: Oct. 7, 2024, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.7

CVSS4.0

CVE-2024-9563 - D-Link DIR-605L formWlanSetup_Wizard buffer overflow

A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13B01 BETA. This issue affects the function formWlanSetup_Wizard of the file /goform/formWlanSetup_Wizard. The manipulation of the argument webpage leads to buffer overflow. The attack may be initiated remotely. …

πŸ“… Published: Oct. 6, 2024, 11:31 p.m. πŸ”„ Last Modified: Oct. 8, 2024, 6:38 p.m.

8.7

CVSS4.0

CVE-2024-9562 - D-Link DIR-605L formSetWizard2 buffer overflow

A vulnerability classified as critical was found in D-Link DIR-605L 2.13B01 BETA. This vulnerability affects the function formSetWizard1/formSetWizard2. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the pub…

πŸ“… Published: Oct. 6, 2024, 11 p.m. πŸ”„ Last Modified: Oct. 8, 2024, 6:38 p.m.

8.7

CVSS4.0

CVE-2024-9561 - D-Link DIR-605L formSetWAN_Wizard52 buffer overflow

A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01 BETA. This affects the function formSetWAN_Wizard51/formSetWAN_Wizard52. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed…

πŸ“… Published: Oct. 6, 2024, 10:31 p.m. πŸ”„ Last Modified: Oct. 8, 2024, 6:38 p.m.

5.3

CVSS4.0

CVE-2024-9560 - ESAFENET CDG Catelogs;logindojojs delCatelogs sql injection

A vulnerability was found in ESAFENET CDG V5. It has been rated as critical. Affected by this issue is the function delCatelogs of the file /CDGServer3/document/Catelogs;logindojojs?command=DelCatelogs. The manipulation of the argument id leads to sql injection. The attack may be launched remotely.…

πŸ“… Published: Oct. 6, 2024, 10 p.m. πŸ”„ Last Modified: Nov. 5, 2024, 1:05 p.m.

8.7

CVSS4.0

CVE-2024-9559 - D-Link DIR-605L formWlanSetup buffer overflow

A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage leads to buffer overflow. It is possible to launch the attack remotely. The exploit has b…

πŸ“… Published: Oct. 6, 2024, 6:31 p.m. πŸ”„ Last Modified: Oct. 8, 2024, 6:37 p.m.
Total resulsts: 349182
Page 8382 of 34,919
Β« previous page Β» next page
Filters