Show filters
662 Total Results
Displaying 21-30 of 662
Sort by:
Attacker Value
Unknown

CVE-2024-23920

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the onboardee module. The issue results from improper access control. An attacker can leverage this vulnerability to execute code in the context of root.
0
Attacker Value
Unknown

CVE-2024-23971

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OCPP messages. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
0
Attacker Value
Unknown

CVE-2024-23970

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to compromise transport security on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CURLOPT_SSL_VERIFYHOST setting. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
0
Attacker Value
Unknown

CVE-2024-23969

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the wlanchnllst function. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root.
0
Attacker Value
Unknown

CVE-2024-23968

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SrvrToSmSetAutoChnlListMsg function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
0
Attacker Value
Unknown

CVE-2024-52329

Disclosure Date: January 23, 2025 (last updated January 24, 2025)
ECOVACS HOME mobile app plugins for specific robots do not properly validate TLS certificates. An unauthenticated attacker can read or modify TLS traffic and obtain authentication tokens.
0
Attacker Value
Unknown

CVE-2024-52327

Disclosure Date: January 23, 2025 (last updated January 24, 2025)
The cloud service used by ECOVACS robot lawnmowers and vacuums allows authenticated attackers to bypass the PIN entry required to access the live video feed.
0
Attacker Value
Unknown

CVE-2024-51888

Disclosure Date: January 21, 2025 (last updated January 22, 2025)
Incorrect Privilege Assignment vulnerability in NotFound Homey Login Register allows Privilege Escalation. This issue affects Homey Login Register: from n/a through 2.4.0.
0
Attacker Value
Unknown

CVE-2025-0294

Disclosure Date: January 07, 2025 (last updated January 08, 2025)
A vulnerability has been found in SourceCodester Home Clean Services Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /public_html/admin/process.php. The manipulation of the argument type/length/business leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
0
Attacker Value
Unknown

CVE-2024-45558

Disclosure Date: January 06, 2025 (last updated January 14, 2025)
Transient DOS can occur when the driver parses the per STA profile IE and tries to access the EXTN element ID without checking the IE length.