NA - CVE-2024-48288 - TP-Link TL-IPC42C V4.0_20211227_1.0.16 is...
TP-Link TL-IPC42C V4.0_20211227_1.0.16 is vulnerable to command injection due to the lack of malicious code verification on both the frontend and backend.
NA - CVE-2024-52287 - authentik is an open-source identity provider....
authentik is an open-source identity provider. When using the client_credentials or device_code OAuth grants, it was possible for an attacker to get a token from authentik with scopes that...
NA - CVE-2024-52289 - authentik is an open-source identity provider....
authentik is an open-source identity provider. Redirect URIs in the OAuth2 provider in authentik are checked by RegEx comparison. When no Redirect URIs are configured in a provider, authentik will...
NA - CVE-2024-52307 - authentik is an open-source identity provider....
authentik is an open-source identity provider. Due to the usage of a non-constant time comparison for the /-/metrics/ endpoint it was possible to brute-force the SECRET_KEY, which is used to...
NA - CVE-2024-52309 - SFTPGo is a full-featured and highly...
SFTPGo is a full-featured and highly configurable SFTP, HTTP/S, FTP/S and WebDAV server - S3, Google Cloud Storage, Azure Blob. One powerful feature of SFTPGo is the ability to have the...
NA - CVE-2024-53333 - TOTOLINK EX200 v4.0.3c.7646_B20201211 was found...
TOTOLINK EX200 v4.0.3c.7646_B20201211 was found to contain a command insertion vulnerability in the setUssd function. This vulnerability allows an attacker to execute arbitrary commands via the...
NA - CVE-2024-53432 - While parsing certain malformed PLY files, PCL...
While parsing certain malformed PLY files, PCL version 1.14.1 crashes due to an uncaught std::out_of_range exception in PCLPointCloud2::at. This issue could potentially be exploited to cause a...
NA - CVE-2024-51337 - Cross Site Scripting vulnerability in Gibbon...
Cross Site Scripting vulnerability in Gibbon before v.27.0.01 and fixed in v.28.0.00 allows a remote attacker to obtain sensitive information via the email parameter found in /Gibbon/modules/User...