Show filters
662 Total Results
Displaying 161-170 of 662
Sort by:
Attacker Value
Unknown
CVE-2023-33045
Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute.
0
Attacker Value
Unknown
CVE-2023-28569
Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Information disclosure in WLAN HAL while handling command through WMI interfaces.
0
Attacker Value
Unknown
CVE-2023-28563
Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Information disclosure in IOE Firmware while handling WMI command.
0
Attacker Value
Unknown
CVE-2023-28554
Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Information Disclosure in Qualcomm IPC while reading values from shared memory in VM.
0
Attacker Value
Unknown
CVE-2023-28553
Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Information Disclosure in WLAN Host when processing WMI event command.
0
Attacker Value
Unknown
CVE-2023-24852
Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Memory Corruption in Core due to secure memory access by user while loading modem image.
0
Attacker Value
Unknown
CVE-2023-5570
Disclosure Date: October 27, 2023 (last updated February 25, 2025)
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Inohom Home Manager Gateway allows Account Footprinting.This issue affects Home Manager Gateway: before v.1.27.12.
0
Attacker Value
Unknown
CVE-2023-41894
Disclosure Date: October 20, 2023 (last updated February 25, 2025)
Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2023-41893
Disclosure Date: October 20, 2023 (last updated February 25, 2025)
Home assistant is an open source home automation. The audit team’s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate a user and retrieve account access. Notably, this attack strategy is plausible if the victim has exposed their Home Assistant to the Internet, since after acquiring the victim’s `access_token` the adversary would need to utilize it directly towards the instance to achieve any pertinent malicious actions. To achieve this compromise attempt, the attacker must send a link with a `redirect_uri` that they control to the victim’s own Home Assistant instance. In the eventuality the victim …
0
Attacker Value
Unknown
CVE-2023-44385
Disclosure Date: October 19, 2023 (last updated February 25, 2025)
The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161.
0