NA - CVE-2024-53908 - An issue was discovered in Django 5.1 before...
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is...
NA - CVE-2024-10771 - Due to missing input validation during one step...
Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can...
NA - CVE-2024-10772 - Since the firmware update is not validated, an...
Since the firmware update is not validated, an attacker can install modified firmware on the device. This has a high impact on the availabilty, integrity and confidentiality up to the complete...
NA - CVE-2024-10773 - The product is vulnerable to pass-the-hash...
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain full...
NA - CVE-2024-10774 - Unauthenticated CROWN APIs allow access to...
Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authentication.
NA - CVE-2024-10776 - Lua apps can be deployed, removed, started,...
Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files...
NA - CVE-2024-11022 - The authentication process to the web server...
The authentication process to the web server uses a challenge response procedure which inludes the nonce and additional information. This challenge can be used several times for login and is...
High - CVE-2024-10516 - The Swift Performance Lite plugin for WordPress...
The Swift Performance Lite plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 2.3.7.1 via the 'ajaxify' function. This makes it possible...
Medium - CVE-2024-11321 - Improper Neutralization of Input During Web...
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hi e-learning Learning Management System (LMS) allows Reflected XSS.This issue...
NA - CVE-2024-21571 - Snyk has identified a remote code execution...
Snyk has identified a remote code execution (RCE) vulnerability in all versions of Code Agent. The vulnerability enables an attacker to execute arbitrary code within the Code Agent container....