Show filters
97 Total Results
Displaying 1-10 of 97
Sort by:
Attacker Value
Moderate
CVE-2019-2215
Disclosure Date: October 11, 2019 (last updated July 26, 2024)
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
1
Attacker Value
Unknown
CVE-2020-0022
Disclosure Date: February 13, 2020 (last updated February 21, 2025)
In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715
2
Attacker Value
Unknown
CVE-2024-48913
Disclosure Date: October 15, 2024 (last updated October 16, 2024)
Hono, a web framework, prior to version 4.6.5 is vulnerable to bypass of cross-site request forgery (CSRF) middleware by a request without Content-Type header. Although the CSRF middleware verifies the Content-Type Header, Hono always considers a request without a Content-Type header to be safe. This can allow an attacker to bypass CSRF protection implemented with Hono CSRF middleware. Version 4.6.5 fixes this issue.
0
Attacker Value
Unknown
CVE-2024-43787
Disclosure Date: August 22, 2024 (last updated August 23, 2024)
Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8.
0
Attacker Value
Unknown
CVE-2024-32869
Disclosure Date: April 23, 2024 (last updated April 24, 2024)
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue.
0
Attacker Value
Unknown
CVE-2023-23434
Disclosure Date: December 29, 2023 (last updated January 05, 2024)
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
0
Attacker Value
Unknown
CVE-2023-50710
Disclosure Date: December 14, 2023 (last updated December 20, 2023)
Hono is a web framework written in TypeScript. Prior to version 3.11.7, clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. Version 3.11.7 includes the change to fix this issue. As a workaround, avoid using TrieRouter directly.
0
Attacker Value
Unknown
CVE-2021-41564
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
Tad Honor viewing book list function is vulnerable to authorization bypass, thus remote attackers can use special parameters to delete articles arbitrarily without logging in.
0
Attacker Value
Unknown
CVE-2020-27220
Disclosure Date: January 14, 2021 (last updated February 22, 2025)
The Eclipse Hono AMQP and MQTT protocol adapters do not check whether an authenticated gateway device is authorized to receive command & control messages when it has subscribed only to commands for a specific device. The missing check involves verifying that the command target device is configured giving permission for the gateway device to act on its behalf. This means an authenticated device of a certain tenant, notably also a non-gateway device acting like a gateway, may receive command & control messages targeted at a different device of the same tenant without corresponding permissions getting checked.
0
Attacker Value
Unknown
CVE-2020-9223
Disclosure Date: December 29, 2020 (last updated November 28, 2024)
There is a denial of service vulnerability in some Huawei smartphones. Due to the improper processing of received abnormal messages, remote attackers may exploit this vulnerability to cause a denial of service (DoS) on the specific module.
0