Show filters
662 Total Results
Displaying 161-170 of 662
Sort by:
Attacker Value
Unknown

CVE-2023-33045

Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute.
Attacker Value
Unknown

CVE-2023-28569

Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Information disclosure in WLAN HAL while handling command through WMI interfaces.
Attacker Value
Unknown

CVE-2023-28563

Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Information disclosure in IOE Firmware while handling WMI command.
Attacker Value
Unknown

CVE-2023-28554

Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Information Disclosure in Qualcomm IPC while reading values from shared memory in VM.
Attacker Value
Unknown

CVE-2023-28553

Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Information Disclosure in WLAN Host when processing WMI event command.
Attacker Value
Unknown

CVE-2023-24852

Disclosure Date: November 07, 2023 (last updated November 15, 2023)
Memory Corruption in Core due to secure memory access by user while loading modem image.
Attacker Value
Unknown

CVE-2023-5570

Disclosure Date: October 27, 2023 (last updated February 25, 2025)
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Inohom Home Manager Gateway allows Account Footprinting.This issue affects Home Manager Gateway: before v.1.27.12.
Attacker Value
Unknown

CVE-2023-41894

Disclosure Date: October 20, 2023 (last updated February 25, 2025)
Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Attacker Value
Unknown

CVE-2023-41893

Disclosure Date: October 20, 2023 (last updated February 25, 2025)
Home assistant is an open source home automation. The audit team’s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate a user and retrieve account access. Notably, this attack strategy is plausible if the victim has exposed their Home Assistant to the Internet, since after acquiring the victim’s `access_token` the adversary would need to utilize it directly towards the instance to achieve any pertinent malicious actions. To achieve this compromise attempt, the attacker must send a link with a `redirect_uri` that they control to the victim’s own Home Assistant instance. In the eventuality the victim …
Attacker Value
Unknown

CVE-2023-44385

Disclosure Date: October 19, 2023 (last updated February 25, 2025)
The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161.