Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Low

CVE-2021-38759

Disclosure Date: December 07, 2021 (last updated February 23, 2025)
Raspberry Pi OS through 5.10 has the raspberry default password for the pi account. If not changed, attackers can gain administrator privileges.
Attacker Value
Unknown

CVE-2024-23826

Disclosure Date: January 29, 2024 (last updated February 09, 2024)
spbu_se_site is the website of the Department of System Programming of St. Petersburg State University. Before 2024.01.29, when uploading an avatar image, an authenticated user may intentionally use a large Unicode filename which would lead to a server-side denial of service under Windows. This is due to no limitation of the length of the filename and the costly use of the Unicode normalization with the form NFKD on Windows OS. This vulnerability was fixed in the 2024.01.29 release.
Attacker Value
Unknown

CVE-2022-24796

Disclosure Date: March 31, 2022 (last updated February 23, 2025)
RaspberryMatic is a free and open-source operating system for running a cloud-free smart-home using the homematicIP / HomeMatic hardware line of IoT devices. A Remote Code Execution (RCE) vulnerability in the file upload facility of the WebUI interface of RaspberryMatic exists. Missing input validation/sanitization in the file upload mechanism allows remote, unauthenticated attackers with network access to the WebUI interface to achieve arbitrary operating system command execution via shell metacharacters in the HTTP query string. Injected commands are executed as root, thus leading to a full compromise of the underlying system and all its components. Versions after `2.31.25.20180428` and prior to `3.63.8.20220330` are affected. Users are advised to update to version `3.63.8.20220330` or newer. There are currently no known workarounds to mitigate the security impact and users are advised to update to the latest version available.
Attacker Value
Unknown

CVE-2021-38545

Disclosure Date: August 11, 2021 (last updated November 28, 2024)
Raspberry Pi 3 B+ and 4 B devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the Raspberry Pi supplies power to some speakers. The power indicator LED of the Raspberry Pi is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects the Raspberry Pi's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the Raspberry Pi, we can recover the sound played by the speakers.
Attacker Value
Unknown

CVE-2019-15059

Disclosure Date: April 12, 2021 (last updated February 22, 2025)
In Liberty lisPBX 2.0-4, configuration backup files can be retrieved remotely from /backup/lispbx-CONF-YYYY-MM-DD.tar or /backup/lispbx-CDR-YYYY-MM-DD.tar without authentication or authorization. These configuration files have all PBX information including extension numbers, contacts, and passwords.
Attacker Value
Unknown

CVE-2020-15477

Disclosure Date: July 23, 2020 (last updated February 21, 2025)
The WebControl in RaspberryTortoise through 2012-10-28 is vulnerable to remote code execution via shell metacharacters in a URI. The file nodejs/raspberryTortoise.js has no validation on the parameter incomingString before passing it to the child_process.exec function.
Attacker Value
Unknown

CVE-2013-4665

Disclosure Date: December 27, 2019 (last updated November 27, 2024)
SPBAS Business Automation Software 2012 has CSRF.
Attacker Value
Unknown

CVE-2013-4664

Disclosure Date: December 27, 2019 (last updated November 27, 2024)
SPBAS Business Automation Software 2012 has XSS.
Attacker Value
Unknown

CVE-2018-18068

Disclosure Date: April 04, 2019 (last updated November 27, 2024)
The ARM-based hardware debugging feature on Raspberry Pi 3 module B+ and possibly other devices allows non-secure EL1 code to read/write any EL3 (the highest privilege level in ARMv8) memory/register via inter-processor debugging. With a debug host processor A running in non-secure EL1 and a debug target processor B running in any privilege level, the debugging feature allows A to halt B and promote B to any privilege level. As a debug host, A has full control of B even if B owns a higher privilege level than A. Accordingly, A can read/write any EL3 memory/register via B. Also, with this memory access, A can execute arbitrary code in EL3.
0
Attacker Value
Unknown

CVE-2007-0075

Disclosure Date: January 05, 2007 (last updated October 04, 2023)
AspBB stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing user passwords via a direct request for db/aspbb.mdb.
0