Show filters
219 Total Results
Displaying 71-80 of 219
Sort by:
Attacker Value
Unknown

CVE-2021-33881

Disclosure Date: June 06, 2021 (last updated February 22, 2025)
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
Attacker Value
Unknown

CVE-2021-31532

Disclosure Date: May 06, 2021 (last updated February 22, 2025)
NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM.
Attacker Value
Unknown

CVE-2020-35430

Disclosure Date: April 29, 2021 (last updated February 22, 2025)
SQL Injection in com/inxedu/OS/edu/controller/letter/AdminMsgSystemController in Inxedu v2.0.6 via the ids parameter to admin/letter/delsystem.
Attacker Value
Unknown

CVE-2021-27208

Disclosure Date: March 15, 2021 (last updated February 22, 2025)
When booting a Zync-7000 SOC device from nand flash memory, the nand driver in the ROM does not validate the inputs when reading in any parameters in the nand’s parameter page. IF a field read in from the parameter page is too large, this causes a buffer overflow that could lead to arbitrary code execution. Physical access and modification of the board assembly on which the Zynq-7000 SoC device mounted is needed to replace the original NAND flash memory with a NAND flash emulation device for this attack to be successful.
Attacker Value
Unknown

CVE-2021-27097

Disclosure Date: February 17, 2021 (last updated November 28, 2024)
The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT.
Attacker Value
Unknown

CVE-2021-27138

Disclosure Date: February 17, 2021 (last updated November 28, 2024)
The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT.
Attacker Value
Unknown

CVE-2021-3011

Disclosure Date: January 07, 2021 (last updated February 22, 2025)
An electromagnetic-wave side-channel issue was discovered on NXP SmartMX / P5x security microcontrollers and A7x secure authentication microcontrollers, with CryptoLib through v2.9. It allows attackers to extract the ECDSA private key after extensive physical access (and consequently produce a clone). This was demonstrated on the Google Titan Security Key, based on an NXP A7005a chip. Other FIDO U2F security keys are also impacted (Yubico YubiKey Neo and Feitian K9, K13, K21, and K40) as well as several NXP JavaCard smartcards (J3A081, J2A081, J3A041, J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60, J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61, J3D081_M59_DF, J3D081_M61_DF, J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64, J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, J2E082_M65, J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF, and J3E016_M64_DF).
Attacker Value
Unknown

CVE-2020-35488

Disclosure Date: January 05, 2021 (last updated February 22, 2025)
The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This attack requires a specific configuration. Also, the name of the directory created must use a Syslog field. (For example, on Linux it is not possible to create a .. directory. On Windows, it is not possible to create a CON directory.)
Attacker Value
Unknown

CVE-2020-28250

Disclosure Date: November 06, 2020 (last updated February 22, 2025)
Cellinx NVT Web Server 5.0.0.014b.test 2019-09-05 allows a remote user to run commands as root via SetFileContent.cgi because authentication is on the client side.
Attacker Value
Unknown

CVE-2020-9438

Disclosure Date: June 23, 2020 (last updated February 21, 2025)
Tinxy Door Lock with firmware before 3.2 allow attackers to unlock a door by replaying an Unlock request that occurred when the attacker was previously authorized. In other words, door-access revocation is mishandled.