Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown

CVE-2024-3250

Disclosure Date: April 04, 2024 (last updated November 07, 2024)
It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4.
0
Attacker Value
Unknown

CVE-2022-37767

Disclosure Date: September 12, 2022 (last updated November 08, 2023)
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.
Attacker Value
Unknown

CVE-2021-38546

Disclosure Date: August 11, 2021 (last updated November 28, 2024)
CREATIVE Pebble devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.
Attacker Value
Unknown

CVE-2019-19899

Disclosure Date: December 19, 2019 (last updated November 27, 2024)
Pebble Templates 3.1.2 allows attackers to bypass a protection mechanism (intended to block access to instances of java.lang.Class) because getClass is accessible via the public static java.lang.Class java.lang.Class.forName(java.lang.Module,java.lang.String) signature.
Attacker Value
Unknown

CVE-2016-10702

Disclosure Date: November 28, 2017 (last updated November 26, 2024)
Pebble Smartwatch devices through 4.3 mishandle UUID storage, which allows attackers to read an arbitrary application's flash storage, and access an arbitrary application's JavaScript instance, by modifying a UUID value within the header of a crafted application binary.
0
Attacker Value
Unknown

CVE-2012-4023

Disclosure Date: November 08, 2012 (last updated October 05, 2023)
CRLF injection vulnerability in Pebble before 2.6.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
0
Attacker Value
Unknown

CVE-2012-4022

Disclosure Date: November 08, 2012 (last updated October 05, 2023)
Pebble before 2.6.4 allows remote attackers to trigger loss of blog-entry viewability via a crafted comment.
0
Attacker Value
Unknown

CVE-2012-5170

Disclosure Date: November 04, 2012 (last updated October 05, 2023)
Open redirect vulnerability in Pebble before 2.6.4 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
0
Attacker Value
Unknown

CVE-2009-0736

Disclosure Date: February 25, 2009 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in Pebble before 2.3.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0
Attacker Value
Unknown

CVE-2006-5168

Disclosure Date: October 10, 2006 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in the search functionality in Simon Brown Pebble 2.0.0 RC1 and RC2 allows remote attackers to inject arbitrary web script or HTML via the query string.
0