Show filters
222 Total Results
Displaying 31-40 of 222
Sort by:
Attacker Value
Unknown

CVE-2024-22429

Disclosure Date: May 17, 2024 (last updated January 31, 2025)
Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution.
Attacker Value
Unknown

CVE-2024-1707

Disclosure Date: February 21, 2024 (last updated February 12, 2025)
A vulnerability, which was classified as problematic, was found in GARO WALLBOX GLB+ T2EV7 0.5. This affects an unknown part of the file /index.jsp#settings of the component Software Update Handler. The manipulation of the argument Reference leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-254397 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2023-39171

Disclosure Date: December 07, 2023 (last updated December 13, 2023)
SENEC Storage Box V1,V2 and V3 accidentially expose a management UI accessible with publicly known admin credentials.
Attacker Value
Unknown

CVE-2023-39169

Disclosure Date: December 07, 2023 (last updated December 13, 2023)
The affected devices use publicly available default credentials with administrative privileges.
Attacker Value
Unknown

CVE-2023-39172

Disclosure Date: December 07, 2023 (last updated December 13, 2023)
The affected devices transmit sensitive information unencrypted allowing a remote unauthenticated attacker to capture and modify network traffic.
Attacker Value
Unknown

CVE-2023-39167

Disclosure Date: December 07, 2023 (last updated December 13, 2023)
In SENEC Storage Box V1,V2 and V3 an unauthenticated remote attacker can obtain the devices' logfiles that contain sensitive data.
Attacker Value
Unknown

CVE-2023-43776

Disclosure Date: October 17, 2023 (last updated October 26, 2023)
Eaton easyE4 PLC offers a device password protection functionality to facilitate a secure connection and prevent unauthorized access. It was observed that the device password was stored with a weak encoding algorithm in the easyE4 program file when exported to SD card (*.PRG file ending).
Attacker Value
Unknown

CVE-2023-28075

Disclosure Date: August 16, 2023 (last updated October 08, 2023)
Dell BIOS contain a Time-of-check Time-of-use vulnerability in BIOS. A local authenticated malicious user with physical access to the system could potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI in order to gain arbitrary code execution on the system.
Attacker Value
Unknown

CVE-2023-34625

Disclosure Date: July 20, 2023 (last updated October 08, 2023)
ShowMojo MojoBox Digital Lockbox 1.4 is vulnerable to Authentication Bypass. The implementation of the lock opening mechanism via Bluetooth Low Energy (BLE) is vulnerable to replay attacks. A malicious user is able to intercept BLE requests and replicate them to open the lock at any time. Alternatively, an attacker with physical access to the device on which the Android app is installed, can obtain the latest BLE messages via the app logs and use them for opening the lock.
Attacker Value
Unknown

CVE-2023-3395

Disclosure Date: July 03, 2023 (last updated November 08, 2023)
​All versions of the TWinSoft Configuration Tool store encrypted passwords as plaintext in memory. An attacker with access to system files could open a file to load the document into memory, including sensitive information associated with document, such as password. The attacker could then obtain the plaintext password by using a memory viewer.