| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-2259 | Reflected XXS Vulnerability in InstaRISPACS Software | Meddiff Technologies | InstaRISPACS | - | - | 2024-08-13 10:18:25 | Deep Dive |
| CVE-2024-39430 | UNISOC Chipsets 安全漏洞 | Unisoc (Shanghai) Technologies Co., Ltd. | SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618 | Medium | 5.1 | 2024-07-01 08:41:00 | Deep Dive |
| CVE-2024-39429 | UNISOC Chipsets 安全漏洞 | Unisoc (Shanghai) Technologies Co., Ltd. | SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618 | Medium | 5.1 | 2024-07-01 08:40:59 | Deep Dive |
| CVE-2024-39428 | UNISOC Chipsets 安全漏洞 | Unisoc (Shanghai) Technologies Co., Ltd. | SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000 | Medium | 6.8 | 2024-07-01 08:40:58 | Deep Dive |
| CVE-2024-39427 | UNISOC Chipsets 安全漏洞 | Unisoc (Shanghai) Technologies Co., Ltd. | SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000 | Medium | 5.1 | 2024-07-01 08:40:57 | Deep Dive |
| CVE-2024-2882 | Missing Authorization in SDG Technologies PnPSCADA | SDG Technologies | PnPSCADA | - | - | 2024-06-27 18:55:42 | Deep Dive |
| CVE-2024-34024 | Fujitsu ID Link Manager和Fujitsu TIME CREATOR 安全漏洞 | Fsas Technologies Inc. | FUJITSU Business Application ID Link Manager II | - | - | 2024-06-18 05:44:59 | Deep Dive |
| CVE-2024-33620 | Fujitsu ID Link Manager和Fujitsu TIME CREATOR 安全漏洞 | Fsas Technologies Inc. | FUJITSU Business Application ID Link Manager II | - | - | 2024-06-18 05:44:53 | Deep Dive |
| CVE-2024-33622 | Fujitsu ID Link Manager和Fujitsu TIME CREATOR 安全漏洞 | Fsas Technologies Inc. | FUJITSU Business Application ID Link Manager II | - | - | 2024-06-18 05:44:19 | Deep Dive |
| CVE-2024-36454 | FUJITSU Network IPCOM EX2 安全漏洞 | Fsas Technologies Inc. | IPCOM EX2 Series (V01L0x Series) | - | - | 2024-06-12 05:12:24 | Deep Dive |
| CVE-2024-35683 | WordPress Leyka plugin <= 3.31.1 - Broken Access Control vulnerability | Teplitsa of social technologies | Leyka | Medium | 5.3 | 2024-06-11 13:39:09 | Deep Dive |
| CVE-2023-33327 | WordPress Leyka plugin <= 3.30.2 - Privilege Escalation vulnerability | Teplitsa of social technologies | Leyka | High | 8.8 | 2024-05-14 21:25:41 | Deep Dive |
| CVE-2023-45000 | WordPress LiteSpeed Cache plugin <= 5.7 - Unauthenticated Broken Access Control on API vulnerability | LiteSpeed Technologies | LiteSpeed Cache | High | 8.2 | 2024-04-16 17:51:09 | Deep Dive |
| CVE-2023-40000 | WordPress LiteSpeed Cache plugin <= 5.7 - Unauthenticated Site Wide Stored XSS vulnerability | LiteSpeed Technologies | LiteSpeed Cache | High | 8.3 | 2024-04-16 17:46:37 | Deep Dive |
| CVE-2024-29844 | Default credentials on web interface of Evolution Controller Versions allows attackers to login and perform administrative functions | CS Technologies Australia | Evolution Controller | Critical | 9.8 | 2024-04-14 23:48:27 | Deep Dive |
| CVE-2024-29843 | Broken Access control on MOBILE_GET_USERS_LIST in Evolution Controller allows unauthenticated user enumeration | CS Technologies Australia | Evolution Controller | High | 7.5 | 2024-04-14 23:48:22 | Deep Dive |
| CVE-2024-29842 | Broken Access control on DESKTOP_EDIT_USER_GET_ABACARD_FIELDS in Evolution Controller allows unauthenticated attackers to retrieve ABACARD values | CS Technologies Australia | Evolution Controller | High | 7.5 | 2024-04-14 23:48:17 | Deep Dive |
| CVE-2024-29841 | Broken Access control on DESKTOP_EDIT_USER_GET_KEYS_FIELDS in Evolution Controller allows unauthenticated attackers to retrieve keys values | CS Technologies Australia | Evolution Controller | High | 7.5 | 2024-04-14 23:48:12 | Deep Dive |
| CVE-2024-29840 | Broken Access control on DESKTOP_EDIT_USER_GET_PIN_FIELDS in Evolution Controller allows unauthenticated attackers to retrieve PIN field values | CS Technologies Australia | Evolution Controller | High | 7.5 | 2024-04-14 23:48:05 | Deep Dive |
| CVE-2024-29839 | Broken Access control on DESKTOP_EDIT_USER_GET_CARD in Evolution Controller allows unauthenticated attackers to retrieve card data values. | CS Technologies Australia | Evolution Controller | High | 7.5 | 2024-04-14 23:48:01 | Deep Dive |