Show filters
492 Total Results
Displaying 41-50 of 492
Sort by:
Attacker Value
Unknown
CVE-2024-32855
Disclosure Date: June 25, 2024 (last updated February 05, 2025)
Dell Client Platform BIOS contains an Out-of-bounds Write vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering.
0
Attacker Value
Unknown
CVE-2024-22429
Disclosure Date: May 17, 2024 (last updated January 31, 2025)
Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution.
0
Attacker Value
Unknown
CVE-2023-6324
Disclosure Date: May 15, 2024 (last updated February 12, 2025)
ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity
0
Attacker Value
Unknown
CVE-2023-6323
Disclosure Date: May 15, 2024 (last updated February 12, 2025)
ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.
0
Attacker Value
Unknown
CVE-2023-6322
Disclosure Date: May 15, 2024 (last updated February 12, 2025)
A stack-based buffer overflow vulnerability exists in the message parsing functionality of the Roku Indoor Camera SE version 3.0.2.4679 and Wyze Cam v3 version 4.36.11.5859. A specially crafted message can lead to stack-based buffer overflow. An attacker can make authenticated requests to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2024-23806
Disclosure Date: February 07, 2024 (last updated October 11, 2024)
Sensitive data can be extracted from HID iCLASS SE reader configuration cards. This could include credential and device administrator keys.
0
Attacker Value
Unknown
CVE-2024-22388
Disclosure Date: February 06, 2024 (last updated October 17, 2024)
Certain configuration available in the communication channel for encoders could expose sensitive data when reader configuration cards are programmed. This data could include credential and device administration keys.
0
Attacker Value
Unknown
CVE-2023-43744
Disclosure Date: December 08, 2023 (last updated December 14, 2023)
An OS command injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an administrator to execute arbitrary OS commands via a file name parameter in a patch application function. The Zultys MX Administrator client has a "Patch Manager" section that allows administrators to apply patches to the device. The user supplied filename for the patch file is passed to a shell script without validation. Including bash command substitution characters in a patch file name results in execution of the provided command.
0
Attacker Value
Unknown
CVE-2023-43743
Disclosure Date: December 08, 2023 (last updated December 14, 2023)
A SQL injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an authenticated attacker to execute arbitrary SQL queries on the backend database via the filter parameter in requests to the /newapi/ endpoint in the Zultys MX web interface.
0
Attacker Value
Unknown
CVE-2023-43742
Disclosure Date: December 08, 2023 (last updated December 14, 2023)
An authentication bypass in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an unauthenticated attacker to obtain an administrative session via a protection mechanism failure in the authentication function. In normal operation, the Zultys MX Administrator Windows client connects to port 7505 and attempts authentication, submitting the administrator username and password to the server. Upon authentication failure, the server sends a login failure message prompting the client to disconnect. However, if the client ignores the failure message instead and attempts to continue, the server does not forcibly close the connection and processes all subsequent requests from the client as if authentication had been successful.
0