Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown

CVE-2024-32861

Disclosure Date: July 16, 2024 (last updated January 13, 2025)
Under certain circumstances the impacted Software House C•CURE 9000 installer will utilize unnecessarily wide permissions.
0
Attacker Value
Unknown

CVE-2024-32753

Disclosure Date: July 11, 2024 (last updated August 16, 2024)
Under certain circumstances the camera may be susceptible to known vulnerabilities associated with the JQuery versions prior to 3.5.0 third-party component
0
Attacker Value
Unknown

CVE-2024-32759

Disclosure Date: July 10, 2024 (last updated July 11, 2024)
Under certain circumstances the Software House C●CURE 9000 installer will utilize weak credentials.
0
Attacker Value
Unknown

CVE-2024-32754

Disclosure Date: July 04, 2024 (last updated July 04, 2024)
Under certain circumstances, when the controller is in factory reset mode waiting for initial setup, it will broadcast its MAC address, serial number, and firmware version. Once configured, the controller will no longer broadcast this information.
0
Attacker Value
Unknown

CVE-2024-32932

Disclosure Date: July 02, 2024 (last updated July 03, 2024)
Under certain circumstances the web interface users credentials may be recovered by an authenticated user.
0
Attacker Value
Unknown

CVE-2024-32757

Disclosure Date: July 02, 2024 (last updated July 03, 2024)
Under certain circumstances unnecessary user details are provided within system logs
0
Attacker Value
Unknown

CVE-2024-32756

Disclosure Date: July 02, 2024 (last updated July 03, 2024)
Under certain circumstances the Linux users credentials may be recovered by an authenticated user.
0
Attacker Value
Unknown

CVE-2024-32755

Disclosure Date: July 02, 2024 (last updated July 03, 2024)
Under certain circumstances the web interface will accept characters unrelated to the expected input.
0
Attacker Value
Unknown

CVE-2024-32752

Disclosure Date: June 06, 2024 (last updated June 07, 2024)
Under certain circumstances communications between the ICU tool and an iSTAR Pro door controller is susceptible to Machine-in-the-Middle attacks which could impact door control and configuration.
0