Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Unknown
CVE-2024-52033
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
Exposure of sensitive system information to an unauthorized control sphere issue exists in Rakuten Turbo 5G firmware version V1.3.18 and earlier. If this vulnerability is exploited, a remote unauthenticated attacker may obtain information of the other devices connected through the Wi-Fi.
0
Attacker Value
Unknown
CVE-2024-48895
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in Rakuten Turbo 5G firmware version V1.3.18 and earlier. If this vulnerability is exploited, a remote authenticated attacker may execute an arbitrary OS command.
0
Attacker Value
Unknown
CVE-2024-47865
Disclosure Date: November 20, 2024 (last updated November 20, 2024)
Missing authentication for critical function vulnerability exists in Rakuten Turbo 5G firmware version V1.3.18 and earlier. If this vulnerability is exploited, a remote unauthenticated attacker may update or downgrade the firmware on the device.
0
Attacker Value
Unknown
CVE-2024-41918
Disclosure Date: August 29, 2024 (last updated August 31, 2024)
'Rakuten Ichiba App' for Android 12.4.0 and earlier and 'Rakuten Ichiba App' for iOS 11.7.0 and earlier are vulnerable to improper authorization in handler for custom URL scheme. An arbitrary site may be displayed on the WebView of the product via Intent from another application installed on the user's device. As a result, the user may be redirected to an unauthorized site, and the user may become a victim of a phishing attack.
0
Attacker Value
Unknown
CVE-2023-40282
Disclosure Date: August 23, 2023 (last updated November 08, 2023)
Improper authentication vulnerability in Rakuten WiFi Pocket all versions allows a network-adjacent attacker to log in to the product's Management Screen. As a result, sensitive information may be obtained and/or the settings may be changed.
0
Attacker Value
Unknown
CVE-2022-29525
Disclosure Date: June 13, 2022 (last updated October 07, 2023)
Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.
0
Attacker Value
Unknown
CVE-2022-28704
Disclosure Date: June 13, 2022 (last updated October 07, 2023)
Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to log in with the root privilege and perform an arbitrary operation if the product is in its default settings in which is set to accept SSH connections from the WAN side, and is also connected to the Internet with the authentication information unchanged from the default settings.
0
Attacker Value
Unknown
CVE-2022-26834
Disclosure Date: June 13, 2022 (last updated October 07, 2023)
Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to obtain the information stored in the product because the product is set to accept HTTP connections from the WAN side by default.
0
Attacker Value
Unknown
CVE-2020-14049
Disclosure Date: June 22, 2020 (last updated February 21, 2025)
Viber for Windows up to 13.2.0.39 does not properly quote its custom URI handler. A malicious website could launch Viber with arbitrary parameters, forcing a victim to send an NTLM authentication request, and either relay the request or capture the hash for offline password cracking. NOTE: this issue exists because of an incomplete fix for CVE-2019-12569.
0
Attacker Value
Unknown
CVE-2018-3987
Disclosure Date: February 13, 2020 (last updated February 21, 2025)
An exploitable information disclosure vulnerability exists in the 'Secret Chats' functionality of Rakuten Viber on Android 9.3.0.6. The 'Secret Chats' functionality allows a user to delete all traces of a chat either by using a time trigger or by direct request. There is a bug in this functionality which leaves behind photos taken and shared on the secret chats, even after the chats are deleted. These photos will be stored in the device and accessible to all applications installed on the Android device.
0