Show filters
219 Total Results
Displaying 81-90 of 219
Sort by:
Attacker Value
Unknown

CVE-2020-11015

Disclosure Date: April 30, 2020 (last updated February 21, 2025)
A vulnerability has been disclosed in thinx-device-api IoT Device Management Server before version 2.5.0. Device MAC address can be spoofed. This means initial registration requests without UDID and spoofed MAC address may pass to create new UDID with same MAC address. Full impact needs to be reviewed further. Applies to all (mostly ESP8266/ESP32) users. This has been fixed in firmware version 2.5.0.
Attacker Value
Unknown

CVE-2020-10648

Disclosure Date: March 19, 2020 (last updated February 21, 2025)
Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
Attacker Value
Unknown

CVE-2013-4211

Disclosure Date: February 14, 2020 (last updated February 21, 2025)
A Code Execution Vulnerability exists in OpenX Ad Server 2.8.10 due to a backdoor in flowplayer-3.1.1.min.js library, which could let a remote malicious user execute arbitrary PHP code
Attacker Value
Unknown

CVE-2020-8432

Disclosure Date: January 29, 2020 (last updated February 21, 2025)
In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.
Attacker Value
Unknown

CVE-2011-2916

Disclosure Date: November 15, 2019 (last updated November 27, 2024)
qtnx 0.9 stores non-custom SSH keys in a world-readable configuration file. If a user has a world-readable or world-executable home directory, another local system user could obtain the private key used to connect to remote NX sessions.
Attacker Value
Unknown

CVE-2019-14239

Disclosure Date: September 24, 2019 (last updated November 27, 2024)
On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by leveraging a load instruction inside the execute-only region to expose the protected code into a CPU register.
Attacker Value
Unknown

CVE-2019-14237

Disclosure Date: September 12, 2019 (last updated November 27, 2024)
On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by observing CPU registers and the effect of code/instruction execution.
Attacker Value
Unknown

CVE-2019-14511

Disclosure Date: August 22, 2019 (last updated November 08, 2023)
Sphinx Technologies Sphinx 3.1.1 by default has no authentication and listens on 0.0.0.0, making it exposed to the internet (unless filtered by a firewall or reconfigured to listen to 127.0.0.1 only).
0
Attacker Value
Unknown

CVE-2019-13106

Disclosure Date: August 06, 2019 (last updated November 27, 2024)
Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution.
Attacker Value
Unknown

CVE-2019-13105

Disclosure Date: August 06, 2019 (last updated November 27, 2024)
Das U-Boot versions 2019.07-rc1 through 2019.07-rc4 can double-free a cached block of data when listing files in a crafted ext4 filesystem.
0