Show filters
246 Total Results
Displaying 161-170 of 246
Sort by:
Attacker Value
Unknown
CVE-2019-14609
Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2019-14611
Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2019-14610
Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2019-14608
Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Improper buffer restrictions in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2019-14612
Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Out of bounds write in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2019-19576
Disclosure Date: December 04, 2019 (last updated November 08, 2023)
class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions.
0
Attacker Value
Unknown
CVE-2019-19117
Disclosure Date: November 18, 2019 (last updated November 27, 2024)
/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.
0
Attacker Value
Unknown
CVE-2019-14356
Disclosure Date: October 31, 2019 (last updated November 08, 2023)
On Coldcard MK1 and MK2 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. On Coldcard MK1 and MK2 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the US…
0
Attacker Value
Unknown
CVE-2017-5731
Disclosure Date: October 28, 2019 (last updated November 27, 2024)
Bounds checking in Tianocompress before November 7, 2017 may allow an authenticated user to potentially enable an escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2019-13525
Disclosure Date: October 25, 2019 (last updated November 27, 2024)
In IP-AK2 Access Control Panel Version 1.04.07 and prior, the integrated web server of the affected devices could allow remote attackers to obtain web configuration data, which can be accessed without authentication over the network.
0