Show filters
440 Total Results
Displaying 301-310 of 440
Sort by:
Attacker Value
Unknown

CVE-2020-27486

Disclosure Date: November 16, 2020 (last updated February 22, 2025)
Garmin Forerunner 235 before 8.20 is affected by: Buffer Overflow. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the string length provided in the data section of the PRG file. It allocates memory for the string immediately, and then copies the string into the TVM object by using a function similar to strcpy. This copy can exceed the length of the allocated string data and overwrite heap data. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.
Attacker Value
Unknown

CVE-2019-19557

Disclosure Date: November 16, 2020 (last updated February 22, 2025)
A misconfiguration in the debug interface in Mercedes-Benz HERMES 1 allows an attacker with direct physical access to device hardware to obtain cellular modem information.
Attacker Value
Unknown

CVE-2019-19562

Disclosure Date: November 16, 2020 (last updated February 22, 2025)
An authentication bypass in the debug interface in Mercedes-Benz HERMES 2.1 allows an attacker with physical access to device hardware to obtain system information.
Attacker Value
Unknown

CVE-2019-19560

Disclosure Date: November 16, 2020 (last updated February 22, 2025)
An authentication bypass in the debug interface in Mercedes-Benz HERMES 1.5 allows an attacker with physical access to device hardware to obtain system information.
Attacker Value
Unknown

CVE-2019-19556

Disclosure Date: November 16, 2020 (last updated November 28, 2024)
An authentication bypass in the debug interface in Mercedes-Benz HERMES 1 allows an attacker with physical access to device hardware to obtain system information.
Attacker Value
Unknown

CVE-2019-19561

Disclosure Date: November 16, 2020 (last updated February 22, 2025)
A misconfiguration in the debug interface in Mercedes-Benz HERMES 1.5 allows an attacker with direct physical access to device hardware to obtain cellular modem information.
Attacker Value
Unknown

CVE-2019-19563

Disclosure Date: November 16, 2020 (last updated November 28, 2024)
A misconfiguration in the debug interface in Mercedes-Benz HERMES 2.1 allows an attacker with direct physical access to device hardware to obtain cellular modem information.
Attacker Value
Unknown

CVE-2020-16273

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.
Attacker Value
Unknown

CVE-2020-26507

Disclosure Date: November 05, 2020 (last updated February 22, 2025)
A CSV Injection (also known as Formula Injection) vulnerability in the Marmind web application with version 4.1.141.0 allows malicious users to gain remote control of other computers. By providing formula code in the “Notes” functionality in the main screen, an attacker can inject a payload into the “Description” field under the “Insert To-Do” option. Other users might download this data, for example a CSV file, and execute the malicious commands on their computer by opening the file using a software such as Microsoft Excel. The attacker could gain remote access to the user’s PC.
Attacker Value
Unknown

CVE-2020-26505

Disclosure Date: November 05, 2020 (last updated February 22, 2025)
A Stored Cross-Site Scripting (XSS) vulnerability in the “Marmind” web application with version 4.1.141.0 allows an attacker to inject code that will later be executed by legitimate users when they open the assets containing the JavaScript code. This would allow an attacker to perform unauthorized actions in the application on behalf of legitimate users or spread malware via the application. By using the “Assets Upload” function, an attacker can abuse the upload function to upload a malicious PDF file containing a stored XSS.