Total
2024 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-31468 | 1 Arubanetworks | 2 Arubaos, Instant | 2024-08-02 | 9.8 Critical |
There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | ||||
CVE-2024-31467 | 1 Arubanetworks | 2 Arubaos, Instant | 2024-08-02 | 9.8 Critical |
There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | ||||
CVE-2024-31466 | 1 Arubanetworks | 2 Arubaos, Instant | 2024-08-02 | 9.8 Critical |
There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | ||||
CVE-2024-31470 | 1 Arubanetworks | 2 Arubaos, Instant | 2024-08-02 | 9.8 Critical |
There is a buffer overflow vulnerability in the underlying SAE (Simultaneous Authentication of Equals) service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. | ||||
CVE-2024-31469 | 1 Arubanetworks | 2 Arubaos, Instant | 2024-08-02 | 9.8 Critical |
There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | ||||
CVE-2024-31079 | 2024-08-02 | 4.8 Medium | ||
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate or causeĀ other potential impact. This attack requires that a request be specifically timed during the connection draining process, which the attacker has no visibility and limited influence over. | ||||
CVE-2024-31163 | 2024-08-02 | 7.2 High | ||
ASUS Download Master has a buffer overflow vulnerability. An unauthenticated remote attacker with administrative privileges can exploit this vulnerability to execute arbitrary system commands on the device. | ||||
CVE-2024-30631 | 1 Tenda | 1 Fh1205 Firmware | 2024-08-02 | 4.3 Medium |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedStartTime parameter from setSchedWifi function. | ||||
CVE-2024-30634 | 2024-08-02 | 8.0 High | ||
Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the mitInterface parameter in the fromAddressNat function. | ||||
CVE-2024-30625 | 2024-08-02 | 8.0 High | ||
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the entrys parameter from fromAddressNat function. | ||||
CVE-2024-30607 | 2024-08-02 | 8.0 High | ||
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the deviceId parameter of the saveParentControlInfo function. | ||||
CVE-2024-30588 | 1 Tenda | 1 Fh1202 Firmware | 2024-08-02 | 4.3 Medium |
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the schedStartTime parameter of the setSchedWifi function. | ||||
CVE-2024-30597 | 2024-08-02 | 6.5 Medium | ||
Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security parameter of the formWifiBasicSet function. | ||||
CVE-2024-30592 | 2024-08-02 | 8.0 High | ||
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the page parameter of the fromAddressNat function. | ||||
CVE-2024-30599 | 2024-08-02 | 8.8 High | ||
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the deviceMac parameter of the addWifiMacFilter function. | ||||
CVE-2024-30633 | 2024-08-02 | 6.5 Medium | ||
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the security parameter from the formWifiBasicSet function. | ||||
CVE-2024-30638 | 1 Tenda | 1 F1202 Firmware | 2024-08-02 | 4.3 Medium |
Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the entrys parameter in the fromAddressNat function. | ||||
CVE-2024-30595 | 2024-08-02 | 9.8 Critical | ||
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the deviceId parameter of the addWifiMacFilter function. | ||||
CVE-2024-30627 | 2024-08-02 | 8.8 High | ||
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the deviceId parameter from saveParentControlInfo function. | ||||
CVE-2024-30590 | 2024-08-02 | 6.5 Medium | ||
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the schedEndTime parameter of the setSchedWifi function. |