Show filters
664 Total Results
Displaying 371-380 of 664
Sort by:
Attacker Value
Unknown
CVE-2021-21518
Disclosure Date: March 10, 2021 (last updated February 22, 2025)
Dell SupportAssist Client for Consumer PCs versions 3.7.x, 3.6.x, 3.4.x, 3.3.x, Dell SupportAssist Client for Business PCs versions 2.0.x, 2.1.x, 2.2.x, and Dell SupportAssist Client ProManage 1.x contain a DLL injection vulnerability in the Costura Fody plugin. A local user with low privileges could potentially exploit this vulnerability, leading to the execution of arbitrary executable on the operating system with SYSTEM privileges.
0
Attacker Value
Unknown
CVE-2020-28952
Disclosure Date: March 09, 2021 (last updated February 22, 2025)
An issue was discovered on Athom Homey and Homey Pro devices before 5.0.0. ZigBee hub devices should generate a unique Standard Network Key that is then exchanged with all enrolled devices so that all inter-device communication is encrypted. However, the cited Athom products use another widely known key that is designed for testing purposes: "01030507090b0d0f00020406080a0c0d" (the decimal equivalent of 1 3 5 7 9 11 13 15 0 2 4 6 8 10 12 13), which is human generated and static across all issued devices.
0
Attacker Value
Unknown
CVE-2021-27935
Disclosure Date: March 03, 2021 (last updated February 22, 2025)
An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie.
0
Attacker Value
Unknown
CVE-2021-25247
Disclosure Date: January 27, 2021 (last updated February 22, 2025)
A DLL hijacking vulnerability Trend Micro HouseCall for Home Networks version 5.3.1063 and below could allow an attacker to use a malicious DLL to escalate privileges and perform arbitrary code execution. An attacker must already have user privileges on the machine to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2021-3152
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
Home Assistant before 2021.1.3 does not have a protection layer that can help to prevent directory-traversal attacks against custom integrations. NOTE: the vendor's perspective is that the vulnerability itself is in custom integrations written by third parties, not in Home Assistant; however, Home Assistant does have a security update that is worthwhile in addressing this situation
0
Attacker Value
Unknown
CVE-2020-27199
Disclosure Date: December 17, 2020 (last updated February 22, 2025)
The Magic Home Pro application 1.5.1 for Android allows Authentication Bypass. The security control that the application currently has in place is a simple Username and Password authentication function. Using enumeration, an attacker is able to forge a User specific token without the need for correct password to gain access to the mobile application as that victim user.
0
Attacker Value
Unknown
CVE-2020-26132
Disclosure Date: October 28, 2020 (last updated February 22, 2025)
An issue was discovered in Home DNS Server 0.10. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the HomeDNSServer.exe binary.
0
Attacker Value
Unknown
CVE-2019-17098
Disclosure Date: September 30, 2020 (last updated February 22, 2025)
Use of hard-coded cryptographic key vulnerability in August Connect Wi-Fi Bridge App, Connect Firmware allows an attacker to decrypt an intercepted payload containing the Wi-Fi network authentication credentials. This issue affects: August Connect Wi-Fi Bridge App version v10.11.0 and prior versions on Android. August Connect Firmware version 2.2.12 and prior versions.
0
Attacker Value
Unknown
CVE-2020-6781
Disclosure Date: August 25, 2020 (last updated February 22, 2025)
Improper certificate validation for certain connections in the Bosch Smart Home System App for iOS prior to version 9.17.1 potentially allows to intercept video contents by performing a man-in-the-middle attack.
0
Attacker Value
Unknown
CVE-2020-9462
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
An issue was discovered in all Athom Homey and Homey Pro devices up to the current version 4.2.0. An attacker within RF range can obtain a cleartext copy of the network configuration of the device, including the Wi-Fi PSK, during device setup. Upon success, the attacker is able to further infiltrate the target's Wi-Fi networks.
0