Show filters
3,391 Total Results
Displaying 131-140 of 3,391
Sort by:
Attacker Value
Unknown
CVE-2024-23923
Disclosure Date: September 28, 2024 (last updated October 04, 2024)
Alpine Halo9 prh_l2_sar_data_ind Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the prh_l2_sar_data_ind function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root.
Was ZDI-CAN-22945
0
Attacker Value
Unknown
CVE-2024-23957
Disclosure Date: September 28, 2024 (last updated October 04, 2024)
Autel MaxiCharger AC Elite Business C50 DLB_HostHeartBeat Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DLB_HostHeartBeat handler of the DLB protocol implementation. When parsing an AES key, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Was ZDI-CAN-23241
0
Attacker Value
Unknown
CVE-2024-23938
Disclosure Date: September 28, 2024 (last updated October 04, 2024)
Silicon Labs Gecko OS Debug Interface Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the debug interface. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Was ZDI-CAN-23184
0
Attacker Value
Unknown
CVE-2024-37187
Disclosure Date: September 27, 2024 (last updated October 08, 2024)
Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding.
0
Attacker Value
Unknown
CVE-2024-34542
Disclosure Date: September 27, 2024 (last updated October 08, 2024)
Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process.
0
Attacker Value
Unknown
CVE-2024-39432
Disclosure Date: September 27, 2024 (last updated October 01, 2024)
In UMTS RLC driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed.
0
Attacker Value
Unknown
CVE-2024-39431
Disclosure Date: September 27, 2024 (last updated October 01, 2024)
In UMTS RLC driver, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed.
0
Attacker Value
Unknown
CVE-2024-47130
Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro App allows unauthenticated attackers to remotely update
the local public keys used for P2P and group messages. It is advised to
update your app to the current release for enhanced encryption
protocols.
0
Attacker Value
Unknown
CVE-2024-47129
Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro App does not inject extra characters into broadcasted
frames to obfuscate the length of messages. This makes it possible to
tell the length of the payload regardless of the encryption used.
0
Attacker Value
Unknown
CVE-2024-47128
Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro App encryption key name is always sent unencrypted when
the key is shared over RF through a broadcast message. It is advised to
share the encryption key via local QR for higher security operations.
0