Show filters
246 Total Results
Displaying 161-170 of 246
Sort by:
Attacker Value
Unknown

CVE-2019-14609

Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2019-14611

Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2019-14610

Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2019-14608

Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Improper buffer restrictions in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2019-14612

Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Out of bounds write in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2019-19576

Disclosure Date: December 04, 2019 (last updated November 08, 2023)
class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions.
Attacker Value
Unknown

CVE-2019-19117

Disclosure Date: November 18, 2019 (last updated November 27, 2024)
/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.
Attacker Value
Unknown

CVE-2019-14356

Disclosure Date: October 31, 2019 (last updated November 08, 2023)
On Coldcard MK1 and MK2 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. On Coldcard MK1 and MK2 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the US…
Attacker Value
Unknown

CVE-2017-5731

Disclosure Date: October 28, 2019 (last updated November 27, 2024)
Bounds checking in Tianocompress before November 7, 2017 may allow an authenticated user to potentially enable an escalation of privilege via local access.
Attacker Value
Unknown

CVE-2019-13525

Disclosure Date: October 25, 2019 (last updated November 27, 2024)
In IP-AK2 Access Control Panel Version 1.04.07 and prior, the integrated web server of the affected devices could allow remote attackers to obtain web configuration data, which can be accessed without authentication over the network.