CVE-2024-31200
MEDIUMDescription
A “CWE-201: Insertion of Sensitive Information Into Sent Data” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext when an administrative session is open in the browser.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| proges | sensor_net_connect_firmware_v2 |
| proges | sensor_net_connect_v2 |
References
Frequently Asked Questions
What is CVE-2024-31200? +
How severe is CVE-2024-31200? +
What products are affected by CVE-2024-31200? +
How do I check if I'm vulnerable to CVE-2024-31200? +
Related Vulnerabilities
Develocity (formerly Gradle Enterprise) before 2024.3.1 allows an attacker who has network access to a Develocity server to obtain the …
An unauthenticated HTTP GET request to the /client.php endpoint will disclose the default administrator user credentials.
When the device is shared, the homepage module are before 2.19.0 in eWeLink Cloud Service allows Secondary user to take …
YugabyteDB has been collecting diagnostics information from YugabyteDB servers, which may include sensitive gflag configurations. To mitigate this, we recommend …
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. The MongoDB …
Sentry-Javascript is an official Sentry SDKs for JavaScript. From version 10.11.0 to before 10.27.0, when a Node.js application using the …