Show filters
664 Total Results
Displaying 391-400 of 664
Sort by:
Attacker Value
Unknown
CVE-2020-7232
Disclosure Date: January 19, 2020 (last updated November 27, 2024)
Evoko Home devices 1.31 through 1.37 allow remote attackers to obtain sensitive information (such as usernames and password hashes) via a WebSocket request, as demonstrated by the sockjs/224/uf1psgff/websocket URI at a wss:// URL.
0
Attacker Value
Unknown
CVE-2020-7231
Disclosure Date: January 19, 2020 (last updated February 21, 2025)
Evoko Home 1.31 devices provide different error messages for failed login requests depending on whether the username is valid.
0
Attacker Value
Unknown
CVE-2019-19688
Disclosure Date: December 18, 2019 (last updated November 27, 2024)
A privilege escalation vulnerability in Trend Micro HouseCall for Home Networks (versions below 5.3.0.1063) could be exploited allowing an attacker to place a malicious DLL file into the application directory and elevate privileges.
0
Attacker Value
Unknown
CVE-2019-19689
Disclosure Date: December 18, 2019 (last updated November 27, 2024)
Trend Micro HouseCall for Home Networks (versions below 5.3.0.1063) could be exploited via a DLL Hijack related to a vulnerability on the packer that the program uses.
0
Attacker Value
Unknown
CVE-2019-18939
Disclosure Date: November 14, 2019 (last updated November 27, 2024)
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request.
0
Attacker Value
Unknown
CVE-2019-18938
Disclosure Date: November 14, 2019 (last updated November 27, 2024)
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the E-Mail AddOn through 1.6.8.c installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the save.cgi script for payload upload and the testtcl.cgi script for its execution.
0
Attacker Value
Unknown
CVE-2019-18937
Disclosure Date: November 14, 2019 (last updated November 27, 2024)
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the Script Parser AddOn through 1.8 installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi script, which executes TCL script content from an HTTP POST request.
0
Attacker Value
Unknown
CVE-2019-15849
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system.
0
Attacker Value
Unknown
CVE-2019-15850
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system.
0
Attacker Value
Unknown
CVE-2018-21019
Disclosure Date: September 23, 2019 (last updated November 27, 2024)
Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py.
0