Show filters
724 Total Results
Displaying 41-50 of 724
Sort by:
Attacker Value
Unknown
CVE-2023-43551
Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
0
Attacker Value
Unknown
CVE-2023-28547
Disclosure Date: April 01, 2024 (last updated January 12, 2025)
Memory corruption in SPS Application while requesting for public key in sorter TA.
0
Attacker Value
Unknown
CVE-2023-33066
Disclosure Date: March 04, 2024 (last updated January 12, 2025)
Memory corruption in Audio while processing RT proxy port register driver.
0
Attacker Value
Unknown
CVE-2024-25972
Disclosure Date: March 01, 2024 (last updated March 01, 2024)
Initialization of a resource with an insecure default vulnerability in OET-213H-BTS1 sold in Japan by Atsumi Electric Co., Ltd. allows a network-adjacent unauthenticated attacker to configure and control the affected product.
0
Attacker Value
Unknown
CVE-2023-7033
Disclosure Date: February 27, 2024 (last updated January 16, 2025)
Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MELSEC iQ-R series CPU module, MELSEC iQ-L series CPU module, MELSEC iQ-R Ethernet Interface Module, MELSEC iQ-R CC-Link IE TSN Master/Local Module, CC-Link IE TSN Remote I/O Module, CC-Link IE TSN Analog-Digital Converter Module, CC-Link IE TSN Digital-Analog Converter Module, CC-Link IE TSN - CC-Link IE Field Network Bridge Module, CC-Link IE TSN - AnyWireASLINK Bridge Module, CC-Link IE TSN FPGA Module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Motion Module, MELSEC iQ-L Motion Module, MELSEC iQ-F FX5 Motion Module, MELSEC iQ-F Series CPU module, MELSEC iQ-F Series Ethernet module, MELSEC iQ-F Series Ethernet/IP module, MELSEC iQ-F Series OPC UA Module, MELSEC iQ-F Series CC-Link IE TSN master/local module, GOT2000 Series CC-Link IE TSN Communication Unit, FR-A800-E series inverters, FR-F800-E series inverters, FR-E800-E series inverters, INVERTER C…
0
Attacker Value
Unknown
CVE-2023-6260
Disclosure Date: February 19, 2024 (last updated February 06, 2025)
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Brivo ACS100, ACS300 allows OS Command Injection, Bypassing Physical Security.This issue affects ACS100 (Network Adjacent Access), ACS300 (Physical Access): from 5.2.4 before 6.2.4.3.
0
Attacker Value
Unknown
CVE-2023-6259
Disclosure Date: February 19, 2024 (last updated February 20, 2024)
Insufficiently Protected Credentials, : Improper Access Control vulnerability in Brivo ACS100, ACS300 allows Password Recovery Exploitation, Bypassing Physical Security.This issue affects ACS100, ACS300: from 5.2.4 before 6.2.4.3.
0
Attacker Value
Unknown
CVE-2023-32462
Disclosure Date: February 15, 2024 (last updated January 24, 2025)
Dell OS10 Networking Switches running 10.5.2.x and above contain an OS command injection vulnerability when using remote user authentication. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands and possible system takeover. This is a critical vulnerability as it allows an attacker to cause severe damage. Dell recommends customers to upgrade at the earliest opportunity.
0
Attacker Value
Unknown
CVE-2023-28078
Disclosure Date: February 15, 2024 (last updated January 24, 2025)
Dell OS10 Networking Switches running 10.5.2.x and above contain a vulnerability with zeroMQ when VLT is configured. A remote unauthenticated attacker could potentially exploit this vulnerability leading to information disclosure and a possible Denial of Service when a huge number of requests are sent to the switch. This is a high severity vulnerability as it allows an attacker to view sensitive data. Dell recommends customers to upgrade at the earliest opportunity.
0
Attacker Value
Unknown
CVE-2023-6258
Disclosure Date: January 30, 2024 (last updated February 09, 2024)
A security vulnerability has been identified in the pkcs11-provider, which is associated with Public-Key Cryptography Standards (PKCS#11). If exploited successfully, this vulnerability could result in a Bleichenbacher-like security flaw, potentially enabling a side-channel attack on PKCS#1 1.5 decryption.
0