Show filters
53 Total Results
Displaying 11-20 of 53
Sort by:
Attacker Value
Unknown
CVE-2023-31241
Disclosure Date: May 22, 2023 (last updated December 09, 2024)
Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright.
0
Attacker Value
Unknown
CVE-2023-31240
Disclosure Date: May 22, 2023 (last updated December 09, 2024)
Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials.
0
Attacker Value
Unknown
CVE-2023-31193
Disclosure Date: May 22, 2023 (last updated October 08, 2023)
Snap One OvrC Pro versions prior to 7.3 use HTTP connections when downloading a program from their servers. Because they do not use HTTPS, OvrC Pro devices are susceptible to exploitation.
0
Attacker Value
Unknown
CVE-2023-28649
Disclosure Date: May 22, 2023 (last updated December 09, 2024)
The Hub in the Snap One OvrC cloud platform is a device used to centralize and manage nested devices connected to it. A vulnerability exists in which an attacker could impersonate a hub and send device requests to claim already claimed devices. The OvrC cloud platform receives the requests but does not validate if the found devices are already managed by another user.
0
Attacker Value
Unknown
CVE-2023-28412
Disclosure Date: May 22, 2023 (last updated October 08, 2023)
When supplied with a random MAC address, Snap One OvrC cloud servers will return information about the device. The MAC address of devices can be enumerated in an attack and the OvrC cloud will disclose their information.
0
Attacker Value
Unknown
CVE-2023-28386
Disclosure Date: May 22, 2023 (last updated December 09, 2024)
Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.
0
Attacker Value
Unknown
CVE-2023-24398
Disclosure Date: April 07, 2023 (last updated November 08, 2023)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Snap Creek Software EZP Coming Soon Page plugin <= 1.0.7.3 versions.
0
Attacker Value
Unknown
CVE-2022-47607
Disclosure Date: March 29, 2023 (last updated November 08, 2023)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Usersnap plugin <= 4.16 versions.
0
Attacker Value
Unknown
CVE-2023-28638
Disclosure Date: March 27, 2023 (last updated November 08, 2023)
Snappier is a high performance C# implementation of the Snappy compression algorithm. This is a buffer overrun vulnerability that can affect any user of Snappier 1.1.0. In this release, much of the code was rewritten to use byte references rather than pointers to pinned buffers. This change generally improves performance and reduces workload on the garbage collector. However, when the garbage collector performs compaction and rearranges memory, it must update any byte references on the stack to refer to the updated location. The .NET garbage collector can only update these byte references if they still point within the buffer or to a point one byte past the end of the buffer. If they point outside this area, the buffer itself may be moved while the byte reference stays the same. There are several places in 1.1.0 where byte references very briefly point outside the valid areas of buffers. These are at locations in the code being used for buffer range checks. While the invalid reference…
0
Attacker Value
Unknown
CVE-2023-23582
Disclosure Date: January 30, 2023 (last updated November 08, 2023)
Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior are vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code or crash the device remotely.
0