Show filters
662 Total Results
Displaying 121-130 of 662
Sort by:
Attacker Value
Unknown

CVE-2023-22819

Disclosure Date: February 05, 2024 (last updated February 14, 2024)
An uncontrolled resource consumption vulnerability issue that could arise by sending crafted requests to a service to consume a large amount of memory, eventually resulting in the service being stopped and restarted was discovered in Western Digital My Cloud Home, My Cloud Home Duo, SanDisk ibi and Western Digital My Cloud OS 5 devices. This issue requires the attacker to already have root privileges in order to exploit this vulnerability. This issue affects My Cloud Home and My Cloud Home Duo: before 9.5.1-104; ibi: before 9.5.1-104; My Cloud OS 5: before 5.27.161.
Attacker Value
Unknown

CVE-2023-22817

Disclosure Date: February 05, 2024 (last updated February 14, 2024)
Server-side request forgery (SSRF) vulnerability that could allow a rogue server on the local network to modify its URL using another DNS address to point back to the loopback adapter. This could then allow the URL to exploit other vulnerabilities on the local server. This was addressed by fixing DNS addresses that refer to loopback. This issue affects My Cloud OS 5 devices before 5.27.161, My Cloud Home, My Cloud Home Duo and SanDisk ibi devices before 9.5.1-104. 
Attacker Value
Unknown

CVE-2024-23978

Disclosure Date: February 02, 2024 (last updated February 10, 2024)
Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. By processing invalid values, arbitrary code may be executed. Note that the affected products are no longer supported.
Attacker Value
Unknown

CVE-2024-21780

Disclosure Date: February 02, 2024 (last updated February 10, 2024)
Stack-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. Processing a specially crafted command may result in a denial of service (DoS) condition. Note that the affected products are no longer supported.
Attacker Value
Unknown

CVE-2023-38587

Disclosure Date: January 19, 2024 (last updated January 31, 2024)
Improper input validation in some Intel NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2023-48419

Disclosure Date: January 02, 2024 (last updated January 10, 2024)
An attacker in the wifi vicinity of a target Google Home can spy on the victim, resulting in Elevation of Privilege 
Attacker Value
Unknown

CVE-2023-43511

Disclosure Date: January 02, 2024 (last updated January 09, 2024)
Transient DOS while parsing IPv6 extension header when WLAN firmware receives an IPv6 packet that contains `IPPROTO_NONE` as the next header.
Attacker Value
Unknown

CVE-2023-33116

Disclosure Date: January 02, 2024 (last updated January 09, 2024)
Transient DOS while parsing ieee80211_parse_mscs_ie in WIN WLAN driver.
Attacker Value
Unknown

CVE-2023-33109

Disclosure Date: January 02, 2024 (last updated January 10, 2024)
Transient DOS while processing a WMI P2P listen start command (0xD00A) sent from host.
Attacker Value
Unknown

CVE-2023-33062

Disclosure Date: January 02, 2024 (last updated January 10, 2024)
Transient DOS in WLAN Firmware while parsing a BTM request.