CVE-2024-50637
Mié, 06/11/2024 – 17:15
CVE-2024-50637
CVE-2024-50637
Mié, 06/11/2024 – 17:15
CVE-2024-50637
CVE-2024-51754
Mié, 06/11/2024 – 20:15
CVE-2024-51754
CVE-2024-51751
Mié, 06/11/2024 – 20:15
CVE-2024-51751
CVE-2024-51988
Mié, 06/11/2024 – 20:15
CVE-2024-51988
CVE-2024-51757
Mié, 06/11/2024 – 20:15
CVE-2024-51757
CVE-2024-51755
Mié, 06/11/2024 – 20:15
CVE-2024-51755
CVE-2024-20531
Mié, 06/11/2024 – 17:15
CVE-2024-20531
This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing XML input. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system or conduct an SSRF attack through the affected device.
CVE-2024-20540
Mié, 06/11/2024 – 17:15
CVE-2024-20540
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into a specific page of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. To exploit this vulnerability, the attacker must have at least a Supervisor role on an affected device.
CVE-2024-20539
Mié, 06/11/2024 – 17:15
CVE-2024-20539
This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials on an affected device.
CVE-2024-20538
Mié, 06/11/2024 – 17:15
CVE-2024-20538
This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface on an affected system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.