Page 22 of 38745 results (0.004 seconds)

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 1

Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoubleL2tpConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50 Vulnerabilidad de desbordamiento de búfer en la región stack de la memoria en los módulos Shenzhen Tenda Technology Co Tenda AC6V2 (setDoubleL2tpConfig->guest_ip_check(overflow arg: mask). Permite desbordamientos de búfer. Este problema afecta a Tenda AC6V2: hasta 15.03.06.50 • https://www.vulsec.org/advisories • CWE-121: Stack-based Buffer Overflow •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 1

Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoublePppoeConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50 Vulnerabilidad de desbordamiento de búfer en la región stack de la memoria en los módulos Shenzhen Tenda Technology Co Tenda AC6V2 (setDoublePppoeConfig->guest_ip_check(overflow arg: mask) permite desbordamientos de búfer. Este problema afecta a Tenda AC6V2: hasta 15.03.06.50 • https://www.vulsec.org/advisories • CWE-121: Stack-based Buffer Overflow •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 1

Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fromAdvSetLanip(overflow arg:lanMask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50 Vulnerabilidad de desbordamiento de búfer en la región stack de la memoria en Shenzhen Tenda Technology Co Tenda AC6V2 (fromAdvSetLanip(overflow arg:lanMask) modules) permite desbordamientos de búfer. Este problema afecta a Tenda AC6V2: hasta 15.03.06.50 • https://www.vulsec.org/advisories • CWE-121: Stack-based Buffer Overflow •

CVSS: 6.9EPSS: 0%CPEs: -EXPL: 0

Moxa’s IP Cameras are affected by a medium-severity vulnerability, CVE-2024-9404, which could lead to a denial-of-service condition or cause a service crash. This vulnerability allows attackers to exploit the Moxa service, commonly referred to as moxa_cmd, originally designed for deployment. Because of insufficient input validation, this service may be manipulated to trigger a denial-of-service. This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. • https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240930-cve-2024-9404-denial-of-service-vulnerability-identified-in-the-vport-07-3-series • CWE-1287: Improper Validation of Specified Type of Input •

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

This includes the ability to power off virtual machines, delete files in storage, and make configuration changes, potentially leading to Denial of Service (DoS) and data integrity issues. • https://www.veeam.com/kb4693 • CWE-862: Missing Authorization •