Show filters
1,622 Total Results
Displaying 31-40 of 1,622
Sort by:
Attacker Value
Unknown

CVE-2024-43543

Disclosure Date: October 08, 2024 (last updated October 18, 2024)
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2024-43536

Disclosure Date: October 08, 2024 (last updated October 17, 2024)
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2024-43526

Disclosure Date: October 08, 2024 (last updated October 18, 2024)
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2024-43525

Disclosure Date: October 08, 2024 (last updated October 18, 2024)
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2024-43524

Disclosure Date: October 08, 2024 (last updated October 18, 2024)
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2024-43523

Disclosure Date: October 08, 2024 (last updated October 18, 2024)
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2024-43513

Disclosure Date: October 08, 2024 (last updated October 18, 2024)
BitLocker Security Feature Bypass Vulnerability
Attacker Value
Unknown

CVE-2024-8421

Disclosure Date: October 01, 2024 (last updated October 31, 2024)
Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed.
0
Attacker Value
Unknown

CVE-2024-8449

Disclosure Date: September 30, 2024 (last updated October 05, 2024)
Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console and use this credential to reset any user's password.
Attacker Value
Unknown

CVE-2024-23961

Disclosure Date: September 28, 2024 (last updated October 04, 2024)
Alpine Halo9 UPDM_wemCmdUpdFSpeDecomp Command Injection Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPDM_wemCmdUpdFSpeDecomp function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-23306