CVE-2024-43652 – “Iocharger AC Firmware Command Injection Vulnerability”
Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability allows OS Command Injection as root This issue affects Iocharger firmware for AC model chargers before version 24120701 Likelihood: Moderate – The binary does not seem to be used by the web interface, so it might be more difficult to find. It seems […]
CVE-2024-43651 – Iocharger AC Model Command Injection Vulnerability
Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability allows OS Command Injection as root This issue affects Iocharger firmware for AC models before version 241207101 Likelihood: Moderate – The binary does not seem to be used by the web interface, so it might be more difficult to find. It seems to […]
CVE-2024-43650 – “Command Injection Vulnerability in Iocharger AC Firmware”
Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability in Iocharger firmware for AC models allows OS Command Injection as root This issue affects firmware versions before 24120701. Likelihood: Moderate – The binary does not seem to be used by the web interface, so it might be more difficult to find. It […]
CVE-2024-43649 – Iocharger AC Model Authenticated Root RCE through Command Injection
Authenticated command injection in the filename of a .exe request leads to remote code execution as the root user. This issue affects Iocharger firmware for AC models before version 24120701. Likelihood: Moderate – This action is not a common place for command injection vulnerabilities to occur. Thus, an attacker will likely only be able to […]
CVE-2024-43648 – Iocharger AC Firmware Root Command Injection Vulnerability
Command injection in the parameter of a .exe request leads to remote code execution as the root user. This issue affects Iocharger firmware for AC models before version 24120701. Likelihood: Moderate – This action is not a common place for command injection vulnerabilities to occur. Thus, an attacker will likely only be able to find […]
CVE-2024-40765 – SonicOS Integer-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2024-40765 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]
CVE-2024-12806 – SonicOS Absolute Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2024-12806 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]
CVE-2024-12805 – SonicOS Format String Vulnerability (Crash/RCE)
The following table lists the changes that have been made to the CVE-2024-12805 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]
CVE-2024-12803 – SonicOS Remote Code Execution Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2024-12803 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]
CVE-2023-1907 – “pgAdmin LDAP Authentication Session Hijacking Vulnerability”
The following table lists the changes that have been made to the CVE-2023-1907 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]