Show filters
15 Total Results
Displaying 11-15 of 15
Sort by:
Attacker Value
Unknown

CVE-2024-29978

Disclosure Date: November 26, 2024 (last updated January 05, 2025)
User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
0
Attacker Value
Unknown

CVE-2024-29146

Disclosure Date: November 26, 2024 (last updated January 05, 2025)
User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
0
Attacker Value
Unknown

CVE-2024-28955

Disclosure Date: November 26, 2024 (last updated January 05, 2025)
Affected devices create coredump files when crashed, storing them with world-readable permission. Any local user of the device can examine the coredump files, and research the memory contents. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
0
Attacker Value
Unknown

CVE-2024-28038

Disclosure Date: November 26, 2024 (last updated January 05, 2025)
The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
0
Attacker Value
Unknown

CVE-2024-23789

Disclosure Date: February 14, 2024 (last updated February 15, 2024)
Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command on the affected product.
0