Show filters
941 Total Results
Displaying 61-70 of 941
Sort by:
Attacker Value
Unknown
CVE-2024-5681
Disclosure Date: July 11, 2024 (last updated February 26, 2025)
CWE-20: Improper Input Validation vulnerability exists that could cause local denial-of-service,
privilege escalation, and potentially kernel execution when a malicious actor with local user
access crafts a script/program using an IOCTL call in the Foxboro.sys driver.
0
Attacker Value
Unknown
CVE-2024-5680
Disclosure Date: July 11, 2024 (last updated February 26, 2025)
CWE-129: Improper Validation of Array Index vulnerability exists that could cause local denial-of-service when a malicious actor with local user access crafts a script/program using an IOCTL
call in the Foxboro.sys driver.
0
Attacker Value
Unknown
CVE-2024-5679
Disclosure Date: July 11, 2024 (last updated February 26, 2025)
CWE-787: Out-of-Bounds Write vulnerability exists that could cause local denial-of-service, or
kernel memory leak when a malicious actor with local user access crafts a script/program using
an IOCTL call in the Foxboro.sys driver.
0
Attacker Value
Unknown
CVE-2024-2602
Disclosure Date: July 11, 2024 (last updated February 26, 2025)
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path
Traversal') vulnerability exists that could result in remote code execution when an authenticated
user executes a saved project file that has been tampered by a malicious actor.
0
Attacker Value
Unknown
CVE-2024-3999
Disclosure Date: July 02, 2024 (last updated February 26, 2025)
The EazyDocs WordPress plugin before 2.5.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
0
Attacker Value
Unknown
CVE-2024-5559
Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could
cause denial of service, device reboot, or an attacker gaining full control of the relay when a
specially crafted reset token is entered into the front panel of the device.
0
Attacker Value
Unknown
CVE-2024-2747
Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-428: Unquoted search path or element vulnerability exists in Easergy Studio, which could
cause privilege escalation when a valid user replaces a trusted file name on the system and
reboots the machine.
0
Attacker Value
Unknown
CVE-2024-0865
Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege
escalation when logged in as a non-administrative user.
0
Attacker Value
Unknown
CVE-2024-5560
Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service of the
device’s web interface when an attacker sends a specially crafted HTTP request.
0
Attacker Value
Unknown
CVE-2024-5558
Disclosure Date: June 12, 2024 (last updated February 26, 2025)
CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability exists that could
cause escalation of privileges when an attacker abuses a limited admin account.
0