Show filters
3,391 Total Results
Displaying 131-140 of 3,391
Sort by:
Attacker Value
Unknown

CVE-2024-23923

Disclosure Date: September 28, 2024 (last updated October 04, 2024)
Alpine Halo9 prh_l2_sar_data_ind Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prh_l2_sar_data_ind function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22945
Attacker Value
Unknown

CVE-2024-23957

Disclosure Date: September 28, 2024 (last updated October 04, 2024)
Autel MaxiCharger AC Elite Business C50 DLB_HostHeartBeat Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DLB_HostHeartBeat handler of the DLB protocol implementation. When parsing an AES key, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23241
Attacker Value
Unknown

CVE-2024-23938

Disclosure Date: September 28, 2024 (last updated October 04, 2024)
Silicon Labs Gecko OS Debug Interface Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the debug interface. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23184
Attacker Value
Unknown

CVE-2024-37187

Disclosure Date: September 27, 2024 (last updated October 08, 2024)
Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding.
Attacker Value
Unknown

CVE-2024-34542

Disclosure Date: September 27, 2024 (last updated October 08, 2024)
Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process.
Attacker Value
Unknown

CVE-2024-39432

Disclosure Date: September 27, 2024 (last updated October 01, 2024)
In UMTS RLC driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed.
Attacker Value
Unknown

CVE-2024-39431

Disclosure Date: September 27, 2024 (last updated October 01, 2024)
In UMTS RLC driver, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed.
Attacker Value
Unknown

CVE-2024-47130

Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro App allows unauthenticated attackers to remotely update the local public keys used for P2P and group messages. It is advised to update your app to the current release for enhanced encryption protocols.
Attacker Value
Unknown

CVE-2024-47129

Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro App does not inject extra characters into broadcasted frames to obfuscate the length of messages. This makes it possible to tell the length of the payload regardless of the encryption used.
Attacker Value
Unknown

CVE-2024-47128

Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro App encryption key name is always sent unencrypted when the key is shared over RF through a broadcast message. It is advised to share the encryption key via local QR for higher security operations.