Show filters
121 Total Results
Displaying 71-80 of 121
Sort by:
Attacker Value
Unknown
Hickory Smart Lock Insecure Storage on iOS
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
An insecure storage of sensitive information vulnerability is present in Hickory Smart for iOS mobile devices from Belwith Products, LLC. The application's database was found to contain information that could be used to control the lock devices remotely. This issue affects Hickory Smart for iOS, version 01.01.07 and prior versions.
0
Attacker Value
Unknown
Hickory Smart Lock Insecure Storage on Android
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
An insecure storage of sensitive information vulnerability is present in Hickory Smart for Android mobile devices from Belwith Products, LLC. The application's database was found to contain information that could be used to control the lock devices remotely. This issue affects Hickory Smart for Android, version 01.01.43 and prior versions.
0
Attacker Value
Unknown
Hickory Smart Lock Cleartext Password
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
A cleartext transmission of sensitive information vulnerability is present in Hickory Smart Ethernet Bridge from Belwith Products, LLC. Captured data reveals that the Hickory Smart Ethernet Bridge device communicates over the network to an MQTT broker without using encryption. This exposed the default username and password used to authenticate to the MQTT broker. This issue affects Hickory Smart Ethernet Bridge, model number H077646. The firmware does not appear to contain versioning information.
0
Attacker Value
Unknown
Hickory Smart Lock Insecure Logging on Android
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
An inclusion of sensitive information in log files vulnerability is present in Hickory Smart for Android mobile devices from Belwith Products, LLC. Communications to the internet API services and direct connections to the lock via Bluetooth Low Energy (BLE) from the mobile application are logged in a debug log on the Android device at HickorySmartLog/Logs/SRDeviceLog.txt. This information was found stored in the Android device's default USB or SDcard storage paths and is accessible without rooting the device. This issue affects Hickory Smart for Android, version 01.01.43 and prior versions.
0
Attacker Value
Unknown
CVE-2019-1010218
Disclosure Date: July 22, 2019 (last updated November 27, 2024)
Cherokee Webserver Latest Cherokee Web server Upto Version 1.2.103 (Current stable) is affected by: Buffer Overflow - CWE-120. The impact is: Crash. The component is: Main cherokee command. The attack vector is: Overwrite argv[0] to an insane length with execl. The fixed version is: There's no fix yet.
0
Attacker Value
Unknown
CVE-2019-20184
Disclosure Date: June 19, 2019 (last updated February 21, 2025)
KeePass 2.4.1 allows CSV injection in the title field of a CSV export.
0
Attacker Value
Unknown
CVE-2018-1000835
Disclosure Date: December 20, 2018 (last updated November 27, 2024)
KeePassDX version <= 2.5.0.0beta17 contains a XML External Entity (XXE) vulnerability in kdbx file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.
0
Attacker Value
Unknown
CVE-2018-19046
Disclosure Date: November 08, 2018 (last updated November 27, 2024)
keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.
0
Attacker Value
Unknown
CVE-2018-19044
Disclosure Date: November 08, 2018 (last updated November 27, 2024)
keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.
0
Attacker Value
Unknown
CVE-2018-19115
Disclosure Date: November 08, 2018 (last updated November 27, 2024)
keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
0