Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown
CVE-2024-3250
Disclosure Date: April 04, 2024 (last updated November 07, 2024)
It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4.
0
Attacker Value
Unknown
CVE-2022-37767
Disclosure Date: September 12, 2022 (last updated November 08, 2023)
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.
0
Attacker Value
Unknown
CVE-2021-38546
Disclosure Date: August 11, 2021 (last updated November 28, 2024)
CREATIVE Pebble devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.
0
Attacker Value
Unknown
CVE-2019-19899
Disclosure Date: December 19, 2019 (last updated November 27, 2024)
Pebble Templates 3.1.2 allows attackers to bypass a protection mechanism (intended to block access to instances of java.lang.Class) because getClass is accessible via the public static java.lang.Class java.lang.Class.forName(java.lang.Module,java.lang.String) signature.
0
Attacker Value
Unknown
CVE-2016-10702
Disclosure Date: November 28, 2017 (last updated November 26, 2024)
Pebble Smartwatch devices through 4.3 mishandle UUID storage, which allows attackers to read an arbitrary application's flash storage, and access an arbitrary application's JavaScript instance, by modifying a UUID value within the header of a crafted application binary.
0
Attacker Value
Unknown
CVE-2012-4023
Disclosure Date: November 08, 2012 (last updated October 05, 2023)
CRLF injection vulnerability in Pebble before 2.6.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
0
Attacker Value
Unknown
CVE-2012-4022
Disclosure Date: November 08, 2012 (last updated October 05, 2023)
Pebble before 2.6.4 allows remote attackers to trigger loss of blog-entry viewability via a crafted comment.
0
Attacker Value
Unknown
CVE-2012-5170
Disclosure Date: November 04, 2012 (last updated October 05, 2023)
Open redirect vulnerability in Pebble before 2.6.4 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
0
Attacker Value
Unknown
CVE-2009-0736
Disclosure Date: February 25, 2009 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in Pebble before 2.3.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0
Attacker Value
Unknown
CVE-2006-5168
Disclosure Date: October 10, 2006 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in the search functionality in Simon Brown Pebble 2.0.0 RC1 and RC2 allows remote attackers to inject arbitrary web script or HTML via the query string.
0