Latest CVE Feed
-
4.9
MEDIUMCVE-2024-8453
Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
7.5
HIGHCVE-2024-8452
Certain switch models from PLANET Technology only support obsolete algorithms for authentication protocol and encryption protocol in the SNMPv3 service, allowing attackers to obtain plaintext SNMPv3 credentials potentially.... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
7.5
HIGHCVE-2024-8451
Certain switch models from PLANET Technology have an SSH service that improperly handles insufficiently authenticated connection requests, allowing unauthorized remote attackers to exploit this weakness to occupy connection slots and prevent legitimate us... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
9.8
CRITICALCVE-2024-8450
Certain switch models from PLANET Technology have a Hard-coded community string in the SNMPv1 service, allowing unauthorized remote attackers to use this community string to access the SNMPv1 service with read-write privileges.... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
6.8
MEDIUMCVE-2024-8449
Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console and use this credential to reset any user's password.... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
8.8
HIGHCVE-2024-8448
Certain switch models from PLANET Technology have a hard-coded credential in the specific command-line interface, allowing remote attackers with regular privilege to log in with this credential and obtain a Linux root shell.... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
8.1
HIGHCVE-2024-8455
The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized rem... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
4.8
MEDIUMCVE-2024-8457
Certain switch models from PLANET Technology have a web application that does not properly validate specific parameters, allowing remote authenticated users with administrator privileges to inject arbitrary JavaScript, leading to Stored XSS attack.... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
9.8
CRITICALCVE-2024-8456
Certain switch models from PLANET Technology lack proper access control in firmware upload and download functionality, allowing unauthenticated remote attackers to download and upload firmware and system configurations, ultimately gaining full control of ... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
8.8
HIGHCVE-2024-8458
Certain switch models from PLANET Technology have a web application that is vulnerable to Cross-Site Request Forgery (CSRF). An unauthenticated remote attacker can trick a user into visiting a malicious website, allowing the attacker to impersonate the us... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
7.2
HIGHCVE-2024-8459
Certain switch models from PLANET Technology store SNMPv3 users' passwords in plaintext within the configuration files, allowing remote attackers with administrator privileges to read the file and obtain the credentials.... Read more
- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
7.5
HIGHCVE-2024-42495
Credentials to access device configuration were transmitted using an unencrypted protocol. These credentials would allow read-only access to network configuration information and terminal configuration data.... Read more
- Published: Sep. 05, 2024
- Modified: Oct. 04, 2024
-
4.6
MEDIUMCVE-2024-39278
Credentials to access device configuration information stored unencrypted in flash memory. These credentials would allow read-only access to network configuration information and terminal configuration data.... Read more
- Published: Sep. 05, 2024
- Modified: Oct. 04, 2024
-
9.8
CRITICALCVE-2024-9106
The Wechat Social login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.3.0. This is due to insufficient verification on the user being supplied during the social login. This makes it possible for unauthenti... Read more
Affected Products :- Published: Oct. 01, 2024
- Modified: Oct. 04, 2024
-
6.4
MEDIUMCVE-2024-8720
The RumbleTalk Live Group Chat – HTML5 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'rumbletalk-admin-button' shortcode in all versions up to, and including, 6.3.0 due to insufficient input sanitization and output esc... Read more
Affected Products :- Published: Oct. 01, 2024
- Modified: Oct. 04, 2024
-
6.1
MEDIUMCVE-2024-8786
The Auto Featured Image from Title plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.3. This makes it possible for unauthent... Read more
Affected Products :- Published: Oct. 01, 2024
- Modified: Oct. 04, 2024
-
7.6
HIGHCVE-2024-46549
An issue in the TP-Link MQTT Broker and API gateway of TP-Link Kasa KP125M v1.0.3 allows attackers to establish connections by impersonating devices owned by other users.... Read more
Affected Products :- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
6.3
MEDIUMCVE-2024-46548
TP-Link Tapo P125M and Kasa KP125M v1.0.3 was discovered to improperly validate certificates, allowing attackers to eavesdrop on communications and access sensitive information via a man-in-the-middle attack.... Read more
Affected Products :- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
8.8
HIGHCVE-2024-46280
PIX-LINK LV-WR22 RE3002-P1-01_V117.0 is vulnerable to Improper Access Control. The TELNET service is enabled with weak credentials for a root-level account, without the possibility of changing them.... Read more
Affected Products :- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024
-
6.5
MEDIUMCVE-2024-47641
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloperr Confetti Fall Animation allows Stored XSS.This issue affects Confetti Fall Animation: from n/a through 1.3.0.... Read more
Affected Products :- Published: Sep. 30, 2024
- Modified: Oct. 04, 2024