Total
992 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-35388 | 2024-07-03 | N/A | 8.8 HIGH | ||
TOTOLINK NR1800X v9.1.0u.6681_B20230703 was discovered to contain a stack overflow via the password parameter in the function urldecode | |||||
CVE-2024-35387 | 2024-07-03 | N/A | 9.8 CRITICAL | ||
TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the http_host parameter in the function loginAuth. | |||||
CVE-2024-34974 | 2024-07-03 | N/A | 8.2 HIGH | ||
Tenda AC18 v15.03.05.19 is vulnerable to Buffer Overflow in the formSetPPTPServer function via the endIp parameter. | |||||
CVE-2024-34950 | 2024-07-03 | N/A | 7.5 HIGH | ||
D-Link DIR-822+ v1.0.5 was discovered to contain a stack-based buffer overflow vulnerability in the SetNetworkTomographySettings module. | |||||
CVE-2024-34946 | 2024-07-03 | N/A | 6.5 MEDIUM | ||
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the page parameter at ip/goform/DhcpListClient. | |||||
CVE-2024-34943 | 2024-07-03 | N/A | 9.8 CRITICAL | ||
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the page parameter at ip/goform/NatStaticSetting. | |||||
CVE-2024-34308 | 2024-07-03 | N/A | 8.8 HIGH | ||
TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the password parameter in the function urldecode. | |||||
CVE-2024-34215 | 2024-07-03 | N/A | 7.3 HIGH | ||
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the setUrlFilterRules function. | |||||
CVE-2024-34213 | 2024-07-03 | N/A | 9.8 CRITICAL | ||
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the SetPortForwardRules function. | |||||
CVE-2024-34212 | 2024-07-03 | N/A | 7.3 HIGH | ||
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the CloudACMunualUpdate function. | |||||
CVE-2024-34209 | 2024-07-03 | N/A | 9.8 CRITICAL | ||
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the setIpPortFilterRules function. | |||||
CVE-2024-34203 | 2024-07-03 | N/A | 3.8 LOW | ||
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the setLanguageCfg function. | |||||
CVE-2024-34202 | 2024-07-03 | N/A | 6.5 MEDIUM | ||
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the setMacFilterRules function. | |||||
CVE-2024-34201 | 2024-07-03 | N/A | 7.3 HIGH | ||
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the getSaveConfig function. | |||||
CVE-2024-34200 | 2024-07-03 | N/A | 8.8 HIGH | ||
TOTOLINK CPE CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the setIpQosRules function. | |||||
CVE-2024-34020 | 2024-07-03 | N/A | 6.5 MEDIUM | ||
A stack-based buffer overflow was found in the putSDN() function of mail.c in hcode through 2.1. | |||||
CVE-2024-33835 | 2024-07-03 | N/A | 9.8 CRITICAL | ||
Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the remoteIp parameter from formSetSafeWanWebMan function. | |||||
CVE-2024-33781 | 2024-07-03 | N/A | 7.5 HIGH | ||
MP-SPDZ v0.3.8 was discovered to contain a stack overflow via the function octetStream::get_bytes in /Tools/octetStream.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message. | |||||
CVE-2024-33772 | 2024-07-03 | N/A | 5.7 MEDIUM | ||
A buffer overflow vulnerability in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 via formTcpipSetup allows remote authenticated users to trigger a denial of service (DoS) through the parameter "curTime." | |||||
CVE-2024-33518 | 2024-07-03 | N/A | 5.3 MEDIUM | ||
An unauthenticated Denial-of-Service (DoS) vulnerability exists in the Radio Frequency Manager service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected service. |