Show filters
941 Total Results
Displaying 61-70 of 941
Sort by:
Attacker Value
Unknown

CVE-2024-5681

Disclosure Date: July 11, 2024 (last updated February 26, 2025)
CWE-20: Improper Input Validation vulnerability exists that could cause local denial-of-service, privilege escalation, and potentially kernel execution when a malicious actor with local user access crafts a script/program using an IOCTL call in the Foxboro.sys driver.
Attacker Value
Unknown

CVE-2024-5680

Disclosure Date: July 11, 2024 (last updated February 26, 2025)
CWE-129: Improper Validation of Array Index vulnerability exists that could cause local denial-of-service when a malicious actor with local user access crafts a script/program using an IOCTL call in the Foxboro.sys driver.
Attacker Value
Unknown

CVE-2024-5679

Disclosure Date: July 11, 2024 (last updated February 26, 2025)
CWE-787: Out-of-Bounds Write vulnerability exists that could cause local denial-of-service, or kernel memory leak when a malicious actor with local user access crafts a script/program using an IOCTL call in the Foxboro.sys driver.
Attacker Value
Unknown

CVE-2024-2602

Disclosure Date: July 11, 2024 (last updated February 26, 2025)
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could result in remote code execution when an authenticated user executes a saved project file that has been tampered by a malicious actor.
Attacker Value
Unknown

CVE-2024-3999

Disclosure Date: July 02, 2024 (last updated February 26, 2025)
The EazyDocs WordPress plugin before 2.5.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Attacker Value
Unknown

CVE-2024-5559

Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially crafted reset token is entered into the front panel of the device.
Attacker Value
Unknown

CVE-2024-2747

Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-428: Unquoted search path or element vulnerability exists in Easergy Studio, which could cause privilege escalation when a valid user replaces a trusted file name on the system and reboots the machine.
Attacker Value
Unknown

CVE-2024-0865

Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege escalation when logged in as a non-administrative user.
Attacker Value
Unknown

CVE-2024-5560

Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service of the device’s web interface when an attacker sends a specially crafted HTTP request.
Attacker Value
Unknown

CVE-2024-5558

Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability exists that could cause escalation of privileges when an attacker abuses a limited admin account.