Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In October 2024
Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
CVSS Score
5.4
EPSS Score
0.002
Published
2024-10-15
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
CVSS Score
9.8
EPSS Score
0.035
Published
2024-10-15
The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
CVSS Score
9.8
EPSS Score
0.018
Published
2024-10-15
An unauthenticated remote attacker can get read access to files in the "/tmp" directory due to missing authentication.
CVSS Score
7.5
EPSS Score
0.005
Published
2024-10-15
An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
CVSS Score
8.4
EPSS Score
0.001
Published
2024-10-15
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
CVSS Score
7.5
EPSS Score
0.01
Published
2024-10-15
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
CVSS Score
8.4
EPSS Score
0.001
Published
2024-10-15
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=reports of the component Report Viewing Page. The manipulation of the argument date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
6.3
EPSS Score
0.001
Published
2024-10-15
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file classes/Master.php?f=add_to_card of the component POST Request Handler. The manipulation of the argument product_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
6.3
EPSS Score
0.001
Published
2024-10-15
The devices are vulnerable to session hijacking due to insufficient entropy in its session ID generation algorithm. The session IDs are predictable, with only 32,768 possible values per user, which allows attackers to pre-generate valid session IDs, leading to unauthorized access to user sessions. This is not only due to the use of an (insecure) rand() function call but also because of missing initialization via srand(). As a result only the PIDs are effectively used as seed.
CVSS Score
9.8
EPSS Score
0.003
Published
2024-10-15


Contact Us

Shodan ® - All rights reserved