Show filters
713 Total Results
Displaying 51-60 of 713
Sort by:
Attacker Value
Unknown
CVE-2023-47677
Disclosure Date: July 08, 2024 (last updated July 12, 2024)
A cross-site request forgery (csrf) vulnerability exists in the boa CSRF protection functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted network request can lead to CSRF. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-45742
Disclosure Date: July 08, 2024 (last updated July 12, 2024)
An integer overflow vulnerability exists in the boa updateConfigIntoFlash functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-45215
Disclosure Date: July 08, 2024 (last updated July 12, 2024)
A stack-based buffer overflow vulnerability exists in the boa setRepeaterSsid functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-41251
Disclosure Date: July 08, 2024 (last updated July 12, 2024)
A stack-based buffer overflow vulnerability exists in the boa formRoute functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-34435
Disclosure Date: July 08, 2024 (last updated July 12, 2024)
A firmware update vulnerability exists in the boa formUpload functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted network packets can lead to arbitrary firmware update. An attacker can provide a malicious file to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2024-21421
Disclosure Date: March 12, 2024 (last updated January 12, 2025)
Azure SDK Spoofing Vulnerability
0
Attacker Value
Unknown
CVE-2024-22473
Disclosure Date: February 21, 2024 (last updated February 13, 2025)
TRNG is used before initialization by ECDSA signing driver when exiting EM2/EM3 on Virtual Secure Vault (VSE) devices. This defect may allow Signature Spoofing by Key Recreation.This issue affects Gecko SDK through v4.4.0.
0
Attacker Value
Unknown
CVE-2023-45318
Disclosure Date: February 20, 2024 (last updated February 13, 2025)
A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP git commit 80d4004. A specially crafted network packet can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2024-0240
Disclosure Date: February 15, 2024 (last updated February 06, 2025)
A memory leak in the Silicon Labs' Bluetooth stack for EFR32 products may cause memory to be exhausted when sending notifications to multiple clients, this results in all Bluetooth operations, such as advertising and scanning, to stop.
0
Attacker Value
Unknown
CVE-2023-36493
Disclosure Date: February 14, 2024 (last updated October 30, 2024)
Uncontrolled search path in some Intel(R) SDK for OpenCL(TM) Applications software may allow an authenticated user to potentially enable escalation of privilege via local access.
0