Show filters
1,297 Total Results
Displaying 11-20 of 1,297
Sort by:
Attacker Value
Unknown
CVE-2024-52325
Disclosure Date: January 23, 2025 (last updated January 24, 2025)
ECOVACS robot lawnmowers and vacuums are vulnerable to command injection via SetNetPin() over an unauthenticated BLE connection.
0
Attacker Value
Unknown
CVE-2025-0457
Disclosure Date: January 16, 2025 (last updated January 16, 2025)
The airPASS from NetVision Information has an OS Command Injection vulnerability, allowing remote attackers with regular privileges to inject and execute arbitrary OS commands.
0
Attacker Value
Unknown
CVE-2025-0456
Disclosure Date: January 16, 2025 (last updated January 16, 2025)
The airPASS from NetVision Information has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access the specific administrative functionality to retrieve * all accounts and passwords.
0
Attacker Value
Unknown
CVE-2025-0455
Disclosure Date: January 16, 2025 (last updated January 16, 2025)
The airPASS from NetVision Information has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
0
Attacker Value
Unknown
CVE-2024-45033
Disclosure Date: January 08, 2025 (last updated January 09, 2025)
Insufficient Session Expiration vulnerability in Apache Airflow Fab Provider.
This issue affects Apache Airflow Fab Provider: before 1.5.2.
When user password has been changed with admin CLI, the sessions for that user have not been cleared, leading to insufficient session expiration, thus logged users could continue to be logged in even after the password was changed. This only happened when the password was changed with CLI. The problem does not happen in case change was done with webserver thus this is different from CVE-2023-40273 https://github.com/advisories/GHSA-pm87-24wq-r8w9 which was addressed in Apache-Airflow 2.7.0
Users are recommended to upgrade to version 1.5.2, which fixes the issue.
0
Attacker Value
Unknown
CVE-2024-56061
Disclosure Date: December 31, 2024 (last updated January 02, 2025)
Missing Authorization vulnerability in Webful Creations Computer Repair Shop allows Privilege Escalation.This issue affects Computer Repair Shop: from n/a through 3.8119.
0
Attacker Value
Unknown
CVE-2023-31280
Disclosure Date: December 21, 2024 (last updated December 21, 2024)
An AirVantage online Warranty Checker tool vulnerability could allow an attacker to
perform bulk enumeration of IMEI and Serial Numbers pairs. The AirVantage Warranty Checker is updated to no longer return the IMEI and Serial
Number in addition to the warranty status when the Serial Number or IMEI is used to look up
warranty status.
0
Attacker Value
Unknown
CVE-2023-31279
Disclosure Date: December 21, 2024 (last updated December 21, 2024)
The AirVantage platform is vulnerable to an unauthorized attacker registering previously unregistered
devices on the AirVantage platform when the owner has not disabled the AirVantage Management
Service on the devices or registered the device. This could enable an attacker to configure, manage,
and execute AT commands on an unsuspecting user’s devices.
0
Attacker Value
Unknown
CVE-2024-56200
Disclosure Date: December 19, 2024 (last updated December 20, 2024)
Altair is a fork of Misskey v12. Affected versions lack of request validation and lack of authentication in the image proxy for compressing and resizing remote files could allow attacks that could affect availability, such as by abnormally increasing the CPU usage of the server on which this software is running or placing a heavy load on the network it is using. This issue has been fixed in v12.24Q4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2024-12259
Disclosure Date: December 18, 2024 (last updated December 18, 2024)
The CRM WordPress Plugin – RepairBuddy plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.8120. This is due to the plugin not properly validating a user's identity prior to updating their email through the wc_update_user_data AJAX action. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
0