CVE-2024-11466
Mié, 04/12/2024 – 08:15
CVE-2024-11466
CVE-2024-11466
Mié, 04/12/2024 – 08:15
CVE-2024-11466
CVE-2024-11293
Mié, 04/12/2024 – 08:15
CVE-2024-11293
CVE-2024-10664
Mié, 04/12/2024 – 08:15
CVE-2024-10664
CVE-2024-11747
Mié, 04/12/2024 – 03:15
CVE-2024-11747
CVE-2024-11093
Mié, 04/12/2024 – 03:15
CVE-2024-11093
CVE-2024-11897
Mié, 04/12/2024 – 03:15
CVE-2024-11897
CVE-2024-11813
Mié, 04/12/2024 – 03:15
CVE-2024-11813
CVE-2024-11807
Mié, 04/12/2024 – 03:15
CVE-2024-11807
*** Pendiente de traducción *** Moxa’s IP Cameras are affected by a medium-severity vulnerability, CVE-2024-9404, which could lead to a denial-of-service condition or cause a service crash. This vulnerability allows attackers to exploit the Moxa service, commonly referred to as moxa_cmd, originally designed for deployment. Because of insufficient input validation, this service may be manipulated to trigger a denial-of-service.
This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Due to the critical nature of this security risk, we strongly recommend taking immediate action to prevent potential exploitation.
CVE-2024-12123
Mié, 04/12/2024 – 04:15
CVE-2024-12123
When an authenticated user submits a ticket, the request can be intercepted and subsequently modified by using a proxy. The ticket requester can be changed from the original requester to another user in the same application,
which the application then accepts.