A vulnerability classified as critical has been found in Mitel MiContact Center Business up to 10.1.0.4. Affected is an unknown function of the component Legacy Chat. The manipulation leads to improper authorization.
This vulnerability is traded as CVE-2024-42514. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Cisco Nexus Dashboard. It has been classified as critical. Affected is an unknown function of the component REST API Endpoint. The manipulation leads to missing authorization.
This vulnerability is traded as CVE-2024-20442. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in DrayTek Vigor3910 up to 4.3.2.6. Affected is an unknown function of the file recvCmd. The manipulation leads to os command injection.
This vulnerability is traded as CVE-2024-41585. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as critical was found in DrayTek Vigor3910 up to 4.3.2.6. Affected by this vulnerability is the function strncpy of the file v2x00.cgi of the component CGI Endpoint. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-41588. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in DrayTek Vigor310 up to 4.3.2.6. This affects the function strcpy of the component CGI Endpoint. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-41590. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in SyroTech SY-GOPON-8OLT-L3 1.6.0_240629 and classified as critical. This issue affects some unknown processing. The manipulation leads to command injection.
The identification of this vulnerability is CVE-2024-46658. The attack can only be done within the local network. There is no exploit available.
A vulnerability has been found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter2.php. The manipulation of the argument from/to leads to sql injection.
This vulnerability is known as CVE-2024-9429. The attack can be launched remotely. Furthermore, there is an exploit available.
The initial researcher advisory only mentions the parameter "from" to be affected. But it must be assumed that parameter "to" is affected as well.
A vulnerability, which was classified as problematic, was found in Simple-Spellchecker 1.0.2. This affects the function _readFileSync. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2024-46503. The attack can only be initiated within the local network. There is no exploit available.
Home and small business security company ADT disclosed it suffered a breach after threat actors gained access to its systems using stolen credentials and exfiltrated employee account data. [...]
A vulnerability, which was classified as problematic, has been found in Apache Johnzon up to 1.2.20. This issue affects some unknown processing of the component JSON Handler. The manipulation leads to deserialization.
The identification of this vulnerability is CVE-2023-33008. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.