Show filters
97 Total Results
Displaying 1-10 of 97
Sort by:
Attacker Value
Moderate

CVE-2019-2215

Disclosure Date: October 11, 2019 (last updated July 26, 2024)
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
Attacker Value
Unknown

CVE-2020-0022

Disclosure Date: February 13, 2020 (last updated February 21, 2025)
In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715
Attacker Value
Unknown

CVE-2024-48913

Disclosure Date: October 15, 2024 (last updated October 16, 2024)
Hono, a web framework, prior to version 4.6.5 is vulnerable to bypass of cross-site request forgery (CSRF) middleware by a request without Content-Type header. Although the CSRF middleware verifies the Content-Type Header, Hono always considers a request without a Content-Type header to be safe. This can allow an attacker to bypass CSRF protection implemented with Hono CSRF middleware. Version 4.6.5 fixes this issue.
0
Attacker Value
Unknown

CVE-2024-43787

Disclosure Date: August 22, 2024 (last updated August 23, 2024)
Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8.
0
Attacker Value
Unknown

CVE-2024-32869

Disclosure Date: April 23, 2024 (last updated April 24, 2024)
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue.
0
Attacker Value
Unknown

CVE-2023-23434

Disclosure Date: December 29, 2023 (last updated January 05, 2024)
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
Attacker Value
Unknown

CVE-2023-50710

Disclosure Date: December 14, 2023 (last updated December 20, 2023)
Hono is a web framework written in TypeScript. Prior to version 3.11.7, clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. Version 3.11.7 includes the change to fix this issue. As a workaround, avoid using TrieRouter directly.
Attacker Value
Unknown

CVE-2021-41564

Disclosure Date: October 08, 2021 (last updated February 23, 2025)
Tad Honor viewing book list function is vulnerable to authorization bypass, thus remote attackers can use special parameters to delete articles arbitrarily without logging in.
Attacker Value
Unknown

CVE-2020-27220

Disclosure Date: January 14, 2021 (last updated February 22, 2025)
The Eclipse Hono AMQP and MQTT protocol adapters do not check whether an authenticated gateway device is authorized to receive command & control messages when it has subscribed only to commands for a specific device. The missing check involves verifying that the command target device is configured giving permission for the gateway device to act on its behalf. This means an authenticated device of a certain tenant, notably also a non-gateway device acting like a gateway, may receive command & control messages targeted at a different device of the same tenant without corresponding permissions getting checked.
Attacker Value
Unknown

CVE-2020-9223

Disclosure Date: December 29, 2020 (last updated November 28, 2024)
There is a denial of service vulnerability in some Huawei smartphones. Due to the improper processing of received abnormal messages, remote attackers may exploit this vulnerability to cause a denial of service (DoS) on the specific module.