Latest CVE Feed
-
6.1
MEDIUMCVE-2024-45279
Due to insufficient input validation, CRM Blueprint Application Builder Panel of SAP NetWeaver Application Server for ABAP allows an unauthenticated attacker to craft a URL link which could embed a malicious JavaScript. When a victim clicks on this link, ... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
4.8
MEDIUMCVE-2024-45280
Due to insufficient encoding of user-controlled inputs, SAP NetWeaver AS Java allows malicious scripts to be executed in the login application. This has a limited impact on confidentiality and integrity of the application. There is no impact on availabili... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
4.3
MEDIUMCVE-2024-41729
Due to missing authorization checks, SAP BEx Analyzer allows an authenticated attacker to access information over the network which is otherwise restricted. On successful exploitation the attacker can enumerate information causing a limited impact on conf... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
9.3
CRITICALCVE-2024-42500
HPE has identified a denial of service vulnerability in HPE HP-UX System's Network File System (NFSv4) services.... Read more
Affected Products :- Published: Sep. 09, 2024
- Modified: Sep. 10, 2024
-
6.5
MEDIUMCVE-2024-45286
Due to lack of proper authorization checks when calling user, a function module in obsolete Tobin interface in SAP Production and Revenue Accounting allows unauthorized access that could lead to disclosure of highly sensitive data. There is no impact on i... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
4.7
MEDIUMCVE-2024-44120
SAP NetWeaver Enterprise Portal is vulnerable to reflected cross site scripting due to insufficient encoding of user-controlled input. An unauthenticated attacker could craft a malicious URL and trick a user to click it. If the victim clicks on this craft... Read more
Affected Products : netweaver- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
6.0
MEDIUMCVE-2024-45283
SAP NetWeaver AS for Java allows an authorized attacker to obtain sensitive information. The attacker could obtain the username and password when creating an RFC destination. After successful exploitation, an attacker can read the sensitive information bu... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
6.8
MEDIUMCVE-2024-43781
A vulnerability has been identified in SINUMERIK 828D V4 (All versions < V4.95 SP3), SINUMERIK 840D sl V4 (All versions < V4.95 SP3 in connection with using Create MyConfig (CMC) <= V4.8 SP1 HF6), SINUMERIK ONE (All versions < V6.23 in connection with usi... Read more
Affected Products : sinumerik_one_firmware- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
4.3
MEDIUMCVE-2024-44113
Due to missing authorization checks, SAP Business Warehouse (BEx Analyzer) allows an authenticated attacker to access information over the network which is otherwise restricted. On successful exploitation the attacker can enumerate information causing a l... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
6.1
MEDIUMCVE-2024-42378
Due to weak encoding of user-controlled inputs, eProcurement on SAP S/4HANA allows malicious scripts to be executed in the application, potentially leading to a Reflected Cross-Site Scripting (XSS) vulnerability. This has no impact on the availability of ... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
8.2
HIGHCVE-2023-30756
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions < V3.5.20), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions < V3.5.20), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions < V3.5.20), SIMA... Read more
- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
5.9
MEDIUMCVE-2023-30755
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions < V3.5.20), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions < V3.5.20), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions < V3.5.20), SIMA... Read more
- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
5.5
MEDIUMCVE-2024-44944
In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, oth... Read more
Affected Products : linux_kernel- Published: Aug. 30, 2024
- Modified: Sep. 10, 2024
-
8.8
HIGHCVE-2024-44333
D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution. An attacker can achieve arbitrary command execution by... Read more
Affected Products :- Published: Sep. 09, 2024
- Modified: Sep. 09, 2024
-
8.8
HIGHCVE-2024-44335
D-Link DI-7003G v19.12.24A1, DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution (RCE) via version_upgrade.asp.... Read more
Affected Products :- Published: Sep. 09, 2024
- Modified: Sep. 09, 2024
-
8.8
HIGHCVE-2024-44334
D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution due to insufficient parameter filtering in the CGI hand... Read more
Affected Products :- Published: Sep. 09, 2024
- Modified: Sep. 09, 2024
-
7.5
HIGHCVE-2024-8509
A vulnerability was found in Forklift Controller. There is no verification against the authorization header except to ensure it uses bearer authentication. Without an Authorization header and some form of a Bearer token, a 401 error occurs. The presence ... Read more
Affected Products :- Published: Sep. 06, 2024
- Modified: Sep. 09, 2024
-
9.0
HIGHCVE-2024-8576
A vulnerability was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. It has been classified as critical. Affected is the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc le... Read more
- Published: Sep. 08, 2024
- Modified: Sep. 09, 2024
-
9.0
HIGHCVE-2024-8577
A vulnerability was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setStaticDhcpRules of the file /cgi-bin/cstecgi.cgi. The manipulation of th... Read more
- Published: Sep. 08, 2024
- Modified: Sep. 09, 2024
-
9.0
HIGHCVE-2024-8575
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 and classified as critical. This issue affects the function setWiFiScheduleCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. The atta... Read more
- Published: Sep. 08, 2024
- Modified: Sep. 09, 2024