Show filters
662 Total Results
Displaying 51-60 of 662
Sort by:
Attacker Value
Unknown
CVE-2023-37822
Disclosure Date: October 03, 2024 (last updated October 30, 2024)
The Eufy Homebase 2 before firmware version 3.3.4.1h creates a dedicated wireless network for its ecosystem, which serves as a proxy to the end user's primary network. The WPA2-PSK generation of this dedicated network is flawed and solely based on the serial number. Due to the flawed generation process, the WPA2-PSK can be brute forced offline within seconds. This vulnerability allows an attacker in proximity to the dedicated wireless network to gain unauthorized access to the end user's primary network. The only requirement of the attack is proximity to the dedicated wireless network.
0
Attacker Value
Unknown
CVE-2024-47044
Disclosure Date: September 26, 2024 (last updated September 26, 2024)
Multiple Home GateWay/Hikari Denwa routers provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION are vulnerable to insufficient access restrictions for Device Setting pages. If this vulnerability is exploited, an attacker who identified WAN-side IPv6 address may access the product's Device Setting page via WAN-side. Note that, the same products are also provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION, but the vulnerability only affects products subscribed and used in NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION areas.
0
Attacker Value
Unknown
CVE-2024-33057
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location.
0
Attacker Value
Unknown
CVE-2024-33051
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Transient DOS while processing TIM IE from beacon frame as there is no check for IE length.
0
Attacker Value
Unknown
CVE-2024-33050
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Transient DOS while parsing MBSSID during new IE generation in beacon/probe frame when IE length check is either missing or improper.
0
Attacker Value
Unknown
CVE-2024-33048
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Transient DOS while parsing the received TID-to-link mapping element of beacon/probe response frame.
0
Attacker Value
Unknown
CVE-2024-33045
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Memory corruption when BTFM client sends new messages over Slimbus to ADSP.
0
Attacker Value
Unknown
CVE-2024-42364
Disclosure Date: August 23, 2024 (last updated September 13, 2024)
Homepage is a highly customizable homepage with Docker and service API integrations. The default setup of homepage 0.9.1 is vulnerable to DNS rebinding. Homepage is setup without certificate and authentication by default, leaving it to vulnerable to DNS rebinding. In this attack, an attacker will ask a user to visit his/her website. The attacker website will then change the DNS records of their domain from their IP address to the internal IP address of the homepage instance. To tell which IP addresses are valid, we can rebind a subdomain to each IP address we want to check, and see if there is a response. Once potential candidates have been found, the attacker can launch the attack by reading the response of the webserver after the IP address has changed. When the attacker domain is fetched, the response will be from the homepage instance, not the attacker website, because the IP address has been changed. Due to a lack of authentication, a user’s private information such as API keys (…
0
Attacker Value
Unknown
CVE-2024-38305
Disclosure Date: August 21, 2024 (last updated January 05, 2025)
Dell SupportAssist for Home PCs Installer exe version 4.0.3 contains a privilege escalation vulnerability in the installer. A local low-privileged authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary executables on the operating system with elevated privileges.
0
Attacker Value
Unknown
CVE-2024-8022
Disclosure Date: August 21, 2024 (last updated August 21, 2024)
A vulnerability was found in Genexis Tilgin Home Gateway 322_AS0500-03_05_13_05. It has been rated as problematic. This issue affects some unknown processing of the file /vood/cgi-bin/vood_view.cgi?lang=EN&act=user/spec_conf&sessionId=86213915328111654515&user=A&message2user=Account%20updated. The manipulation of the argument Phone Number leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0