Critical - CVE-2024-11313 - The DVC from TRCore has a Path Traversal...
The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory,...
Critical - CVE-2024-11314 - The DVC from TRCore has a Path Traversal...
The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory,...
Critical - CVE-2024-11315 - The DVC from TRCore has a Path Traversal...
The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory,...
NA - CVE-2024-22067 - ZTE NH8091 product has an improper permission...
ZTE NH8091 product has an improper permission control vulnerability. Due to improper permission control of the Web module interface, an authenticated attacker may exploit the vulnerability to...
NA - CVE-2024-41151 - Deserialization of Untrusted Data vulnerability...
Deserialization of Untrusted Data vulnerability in Apache HertzBeat. This vulnerability can only be exploited by authorized attackers. This issue affects Apache HertzBeat: before 1.6.1. Users...
High - CVE-2024-41967 - A low privileged remote attacker may modify the...
A low privileged remote attacker may modify the boot mode configuration setup of the device, leading to modification of the firmware upgrade process or a denial-of-service attack.
High - CVE-2024-41969 - A low privileged remote attacker may modify the...
A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS.
NA - CVE-2024-45505 - Improper Neutralization of Special Elements...
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache HertzBeat (incubating). This vulnerability can only be exploited by authorized...